[Forgot Password]
Login  Register Subscribe

23631

 
 

125071

 
 

98250

 
 

909

 
 

79281

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 10538 Download | Alert*

The host is installed with PHP before 5.3.13 and 5.4.x before 5.4.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle query strings that lack an = (equals sign). Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with PHP before 5.4.0 and is prone to directory traversal vulnerability. A flaw is present in the application, which fails to properly handle invalid [ (open square bracket) characters in name values. Successful exploitation allows attackers to cause a denial of service or conduct directory traversal attacks during multi-file uploads by leveraging a script that lacks its own ...

The host is installed with PHP before 5.3.14 or 5.4.x before 5.4.4 and is prone to integer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted tar file. Successful exploitation allows remote attackers to cause a denial of service or possibly execute arbitrary code.

The host is installed with PHP before 5.3.15 or 5.4.0 before 5.4.5 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle the _php_stream_scandir function in the stream implementation. Successful exploitation has unknown impact and remote attack vectors, related to an "overflow."

The host is installed with PHP before 5.3.14 or 5.4.x before 5.4.4 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted parameter value. Successful exploitation allows remote attackers to cause a denial of service (out-of-bounds read and application crash).

The host is installed with PHP 5.3.9 through 5.3.13 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to handle the openssl_encrypt function in ext/openssl/openssl.c. Successful exploitation allows remote attackers to obtain sensitive information from process memory by providing zero bytes of input data.

The host is installed with PHP through 5.5.6 and is prone to denial of service vulnerability. The flaw is present in the scan function in ext/date/lib/parse_iso_intervals.c, which fails to handle the creation of DateInterval objects. Successful exploitation allows remote attackers to cause the heap-based buffer over-read.

The host is installed with Splunk 4.3.0 through 4.3.5 and is prone to cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to handle maliciously crafted link. Successful exploitation allows attackers to inject arbitrary web script or HTML via unspecified vectors.

The host is installed with Apple QuickTime before 7.7 and is prone to buffer overflow vulnerability. A flaw is present in the application which fails to properly handle JPEG files. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.

The host is installed with Apple QuickTime before 7.7 and is prone to integer overflow vulnerability. A flaw is present in the application which fails to properly handle audio channels in movie files. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.


Pages:      Start    1015    1016    1017    1018    1019    1020    1021    1022    1023    1024    1025    1026    1027    1028    ..   1053

© 2013 SecPod Technologies