A boundary error within the MrSID plug-in (MrSID.dll) when processing the IMAGE tag can be exploited to cause a stack-based buffer overflow.
This module runs a web server waiting for vulnerable clients to connect to it. When the client connects, it will try to install an agent by instantiating the "iim" uri handler with a malicious DLL(impact.dll) as parameter.
This update adds WEBDav support.
This update adds WEBDav support.
A Stack-based buffer overflow in VideoLAN VLC media player allows remote attackers to execute arbitrary code via a crafted MMS:// stream.
This version fix a bug with source ip calculation.
This version fix a bug with source ip calculation.
Adobe Flash Player is prone to a use-after-free vulnerability when finishing a Worker thread containing a SharedObject.
This vulnerability can be exploited to execute arbitrary code on vulnerable machines by convincing an unsuspecting user to visit a web site containing a specially crafted SWF file.
This vulnerability can be exploited to execute arbitrary code on vulnerable machines by convincing an unsuspecting user to visit a web site containing a specially crafted SWF file.
The vulnerability is caused due to an error when handling the "PEstrarg1" member within pepco32c.ocx.
Use-after-free vulnerability in Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code via vectors involving crafted JavaScript code.
This version add flash information, Windows 7 support and improve code.
This version add flash information, Windows 7 support and improve code.
Use-after-free vulnerability in Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code via vectors involving crafted JavaScript code.
An integer overflow in the ActiveX control icardie.dll in Internet Explorer allows remote attackers to execute arbitrary code.
A buffer overflow vulnerability within the handling of functions that take a URI as a parameter allows arbitrary command execution when a user loads a specially crafted web page.
Watermark Master is prone to a buffer overflow vulnerability when handling WCF files. This vulnerability could be exploited by a remote attacker to execute arbitrary code on the target machine by enticing users to open a specially crafted WCF file.
Pagination
- Previous page
- Page 21
- Next page