[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253928

 
 

909

 
 

198006

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 197121 Download | Alert*

linux-lts-backport-oneiric: Linux kernel backport from Oneiric Several security issues were fixed in the kernel.

linux-ti-omap4: Linux kernel for OMAP4 Several security issues were fixed in the kernel.

The host is installed with OpenSSH before 5.7 and is prone to a credentials management Errors vulnerability. A flaw is present in the application, which fails to properly handle an issue in auth_parse_options function in auth-options.c in sshd. Successful exploitation could allow remote attackers to bypass intended access restrictions via the filename of . or an empty file name.

The host is installed with OpenSSH through 6.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which is due to default configuration which enforces a fixed time limit between establishing a TCP connection and completing a login. Successful exploitation could allow remote attackers to cause a denial of service (connection-slot exhaustion) by periodically mak ...

The host is installed with OpenSSL 0.9.8 before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m or 1.0.2 before 1.0.2a and is prone to a NULL pointer dereference and application crash crash vulnerability. A flaw is present in the application, which fails to handle a PKCS#7 blob. Successful exploitation allows remote attacker to cause a denial of service.

The host is installed with OpenSSL 0.9.8 before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m or 1.0.2 before 1.0.2a and is prone to a out-of-bounds read and application crash crash vulnerability. A flaw is present in the application, which fails to handle a crafted length field in ASN1_TIME data. Successful exploitation allows remote attacker to cause a denial of service.

The host is installed with kernel on Red Hat Enterprise Linux 6 or 7 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle fork(2) and close(2) system calls with an 'int80' entry. Successful exploitation could allow attackers to escalate the privileges on the system.

The host is installed with Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8, 38.x before 38.1, Thunderbird before 31.8 or 38.x before 38.1 and is prone to a security bypass vulnerability. A flaw is present in the applications, which do not properly determine state transitions for the TLS state machine. Successful exploitation could allow man-in-the-middle attackers to defeat cryptographic ...

The host is missing a critical security update according to Mozilla advisory, MFSA-2015-71. The update is required to fix a security bypass vulnerability. A flaw is present in the applications, which do not properly determine state transitions for the TLS state machine. Successful exploitation could allow man-in-the-middle attackers to defeat cryptographic protection mechanisms by blocking message ...

The host is installed with Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8, 38.x before 38.1, Thunderbird before 31.8 or 38.x before 38.1 and is prone to multiple vulnerabilities. The flaws are present in the applications, which fail to handle unknown vectors. Successful exploitation could allow attackers to cause denial of service (memory corruption and application crash) or possibly ex ...


Pages:      Start    7822    7823    7824    7825    7826    7827    7828    7829    7830    7831    7832    7833    7834    7835    ..   19712

© SecPod Technologies