[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 196303 Download | Alert*

The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle vectors related to connecting to the standard input, output and error file descriptors of another terminal. Successful exploitation allows local users with sudo permissions to hijack the authorization of another ter ...

The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle vectors related to connecting to the standard input, output and error file descriptors of another terminal. Successful exploitation allows local users with sudo permissions to hijack the authorization of another ter ...

The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle vectors related to connecting to the standard input, output and error file descriptors of another terminal. Successful exploitation allows local users with sudo permissions to hijack the authorization of another ter ...

The host is installed with Wireshark 1.4.0 through 1.4.9 or 1.6.x before 1.6.3 and is prone to heap-based buffer overflow vulnerability. A flaw is present in the application, which is caused due to an error in ERF file parser when processing certain malformed file. Successful exploitation allows remote attackers to cause an application crash.

This advisory updates wireshark to the latest version, fixing several security issues: Buffer overflow in the ASN.1 BER dissector in Wireshark 0.10.13 through 1.0.13 and 1.2.0 through 1.2.8 has unknown impact and remote attack vectors . Buffer overflow in the SigComp Universal Decompressor Virtual Machine dissector in Wireshark 0.10.8 through 1.0.13 and 1.2.0 through 1.2.8 has unknown impact and r ...

Multiple vulnerabilities were discovered and corrected in mysql: * Joins involving a table with with a unique SET column could cause a server crash . * Use of TEMPORARY InnoDB tables with nullable columns could cause a server crash . * The server could crash if there were alternate reads from two indexes on a table using the HANDLER interface . * Using EXPLAIN with queries of the form SELECT ... U ...

Multiple vulnerabilities has been found and corrected in mysql: MySQL before 5.1.48 allows remote authenticated users with alter database privileges to cause a denial of service via an ALTER DATABASE command with a #mysql50# string followed by a . , .. , ../ or similar sequence, and an UPGRADE DATA DIRECTORY NAME command, which causes MySQL to move certain directories to the server data director ...

This advisory updates wireshark to the latest version, fixing several security issues: * The SMB dissector could dereference a NULL pointer. * J. Oquendo discovered that the ASN.1 BER dissector could overrun the stack. * The SMB PIPE dissector could dereference a NULL pointer on some platforms. * The SigComp Universal Decompressor Virtual Machine could go into an infinite loop. * The SigComp Uni ...

A vulnerabilitiy has been found and corrected in mysql: MySQL is vulnerable to a symbolic link attack when the data home directory contains a symlink to a different filesystem which allows remote authenticated users to bypass intended access restrictions . The updated packages have been patched to correct these issues.

A vulnerability was discovered in mysql which would permit mysql users without any kind of privileges to use the UNINSTALL PLUGIN function. A problem was discovered in the mysqld init script which under certain circumstances could cause the service to exit too quickly, giving the [ OK ] status and before the mysql server was really started and bound to the mysql socket or IP address. This caused a ...


Pages:      Start    7979    7980    7981    7982    7983    7984    7985    7986    7987    7988    7989    7990    7991    7992    ..   19630

© SecPod Technologies