[Forgot Password]
Login  Register Subscribe

23631

 
 

119105

 
 

98250

 
 

909

 
 

79281

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 11426 Download | Alert*

The host is installed with PHP before 5.3.13 and 5.4.x before 5.4.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle query strings that lack an = (equals sign). Successful exploitation could allow attackers to crash the service.

The host is installed with PHP before 5.3.13 and 5.4.x before 5.4.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle query strings that contain a %3D sequence but no = (equals sign) character. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with PHP before 5.3.13 and 5.4.x before 5.4.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle query strings that lack an = (equals sign). Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with PHP before 5.4.0 and is prone to directory traversal vulnerability. A flaw is present in the application, which fails to properly handle invalid [ (open square bracket) characters in name values. Successful exploitation allows attackers to cause a denial of service or conduct directory traversal attacks during multi-file uploads by leveraging a script that lacks its own ...

The host is installed with PHP before 5.3.14 or 5.4.x before 5.4.4 and is prone to integer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted tar file. Successful exploitation allows remote attackers to cause a denial of service or possibly execute arbitrary code.

The host is installed with PHP before 5.3.15 or 5.4.0 before 5.4.5 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle the _php_stream_scandir function in the stream implementation. Successful exploitation has unknown impact and remote attack vectors, related to an "overflow."

The host is installed with PHP before 5.3.14 or 5.4.x before 5.4.4 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted parameter value. Successful exploitation allows remote attackers to cause a denial of service (out-of-bounds read and application crash).

The host is installed with PHP 5.3.9 through 5.3.13 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to handle the openssl_encrypt function in ext/openssl/openssl.c. Successful exploitation allows remote attackers to obtain sensitive information from process memory by providing zero bytes of input data.

The host is installed with PHP through 5.5.6 and is prone to denial of service vulnerability. The flaw is present in the scan function in ext/date/lib/parse_iso_intervals.c, which fails to handle the creation of DateInterval objects. Successful exploitation allows remote attackers to cause the heap-based buffer over-read.

The host is installed with Splunk 4.0 through 4.3 and is prone to cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to prevent the injection of web script or HTML. Successful exploitation allows remote attackers to inject arbitrary web script or HTML via unknown vectors.


Pages:      Start    1101    1102    1103    1104    1105    1106    1107    1108    1109    1110    1111    1112    1113    1114    ..   1142

© 2013 SecPod Technologies