[Forgot Password]
Login  Register Subscribe

23631

 
 

117687

 
 

98503

 
 

909

 
 

79281

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 10538 Download | Alert*

The host is installed with PHP and is prone to Denial of Service vulnerability. The flaw is present in stream_get_contents function, which fails to handle ziparchive stream. Successful exploitation could allow remote attackers to cause a denial of service via a ziparchive stream.

The host is installed with PHP and is prone to denial of service vulnerability on windows. The flaw is caused due to integer signedness error in zip_stream.c in the Zip extension. Successful exploitation could allow remote attackers to cause a denial of service via a malformed archive file that triggers errors in zip_fread function calls.

The host is installed with PHP and is prone to Denial of Service vulnerability. The flaw is present exif.c in the Exif extension in PHP on 64-bit platforms, which performs an incorrect cast

The host is installed with PHP 5.3.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which performs strndup operations on untrusted string data. Successful exploitation could allow remote attackers to crash the service.

The host is installed with PHP 5.3.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle crafted input to an application that attempts to perform Tidy::diagnose operations on invalid objects. Successful exploitation could allow remote attackers to crash the service.

The host is installed with PHP before 5.3.9 and is prone to denial of service vulnerability. A flaw is present in the application, which does not properly interact with the session feature. Successful exploitation allows emote attackers to cause an application crash.

The host is installed with PHP before 5.3.13 and 5.4.x before 5.4.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle query strings that lack an = (equals sign). Successful exploitation could allow attackers to crash the service.

The host is installed with PHP before 5.3.13 and 5.4.x before 5.4.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle query strings that contain a %3D sequence but no = (equals sign) character. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with PHP before 5.3.13 and 5.4.x before 5.4.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle query strings that lack an = (equals sign). Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with PHP before 5.4.0 and is prone to directory traversal vulnerability. A flaw is present in the application, which fails to properly handle invalid [ (open square bracket) characters in name values. Successful exploitation allows attackers to cause a denial of service or conduct directory traversal attacks during multi-file uploads by leveraging a script that lacks its own ...


Pages:      Start    1014    1015    1016    1017    1018    1019    1020    1021    1022    1023    1024    1025    1026    1027    ..   1053

© 2013 SecPod Technologies