[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

251782

 
 

909

 
 

196543

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14858 Download | Alert*

The host is installed with PHP and is prone to denial of service vulnerability on windows. The flaw is due to memory leaks while using openssl_decrypt and openssl_encrypt functions. Successful exploitation could allow remote attackers to a denial of service

The host is installed with PHP and is prone to Denial of Service vulnerability. The falw is due to unspecified vulnerability in the Streams component. Successful exploitation could allow remote attackers to cause a denial of service by accessing an ftp:// URL during use of an HTTP proxy with the FTP wrapper.

The host is installed with PHP and is prone to Denial of Service vulnerability. The flaw is present in stream_get_contents function, which fails to handle ziparchive stream. Successful exploitation could allow remote attackers to cause a denial of service via a ziparchive stream.

The host is installed with PHP and is prone to Denial of Service vulnerability. The flaw is present in substr_replace() function, which makes the PHP to use the same pointer in three variables inside the function so when the pointer is changed by a type conversion inside the function, it invalids the other variables. Successful exploitation could allow remote attackers to cause a denial of service ...

The host is installed with PHP and is prone to Denial of Service vulnerability. The flaw is present exif.c in the Exif extension in PHP on 64-bit platforms, which performs an incorrect cast

The host is installed with PHP and is prone to denial of service vulnerability. A flaw is present in the imap_do_open function in IMAP extension and imap_do_open function in IMAP extension which fails to perform input validation. Successful exploitation allows the attacker to execute arbitrary code or cause memory corruption.

The host is installed with Google Chrome and is prone to Use-after-free vulnerability. The flaw in present in WebKit in Webcore, due to improper handling of provisional items by the HistoryController component. Successful exploitation could allow remote attackers to crash the affected application, denying service to legitimate users.

The host is installed with VLC Media Player before 1.1.8 and is prone to arbitrary code execution vulnerability. A flaw is present in the application which is caused due to an error when processing video files with large dimensions. Successful exploitation could allow remote attackers to overflow a buffer and execute arbitrary code on the system or cause the application to crash.

The host is installed with VLC Media Player before 1.1.8 and is prone to arbitrary code execution vulnerability. A flaw is present in the application which is caused by a memory corruption error in the "libdirectx" plugin when processing malformed NSV data. Successful exploitation allows remote attacker to overflow a buffer and execute arbitrary code on the system or cause the application to crash ...

The host is installed with Opera before 11.01 and is prone to security vulnerability. A flaw is present in the download manager, which uses the wrong executable when trying to show the folder view. Successful exploitation could let remote attackers to execute arbitrary code via a crafted web site that hosts an executable file.


Pages:      Start    1082    1083    1084    1085    1086    1087    1088    1089    1090    1091    1092    1093    1094    1095    ..   1485

© SecPod Technologies