[Forgot Password]
Login  Register Subscribe

23631

 
 

126951

 
 

99602

 
 

909

 
 

80170

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 11858 Download | Alert*

The host is installed with Pidgin before 2.10.8 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle a negative Content-Length header. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Pidgin before 2.10.10 and is prone to an absolute path traversal vulnerability. A flaw is present in the application, which fails to properly handle a drive name in a tar archive of a smiley theme. Successful exploitation allows attackers to write to arbitrary files.

The host is installed with Foxit Advanced PDF Editor 3 before 3.04 and is prone to stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted document containing instructions that reconstruct a certain security cookie. Successful exploitation allow remote attackers to execute arbitrary code.

The host is installed with Adobe Digital Editions 2.x before 2.0.1 and is prone to unspecified memory corruption vulnerability. The flaw is present in the application, which fails to properly handle memory. Successful exploitation allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.

The host is installed with PuTTY 0.53 or earlier and is prone to arbitrary code execution vulnerability. The flaw is present in the application, which fails to properly handle a certain character escape sequence and then insert it back to the command line in the user's terminal. Successful exploitation could allow the attacker to execute arbitrary commands.

The host is installed with PuTTY 0.53b or earlier and is prone to information disclosure vulnerability. The flaw is present in the application, which does not clear logon credentials from memory, including plaintext passwords. Successful exploitation could allow attackers with access to memory to steal the SSH credentials.

The host is installed with PuTTY 0.59 through 0.61 and is prone to unspecified vulnerability. The flaw is present in the application, which does not clear sensitive process memory when managing user replies that occur during keyboard-interactive authentication. Successful exploitation might allow local users to read login passwords by obtaining access to the process' memory.

The host is installed with PuTTY before 0.63 and is prone to buffer underflow vulnerability. The flaw is present in the modmul function in sshbn.c in PuTTY, which is not properly handled when performing certain bit-shifting operations during modular multiplication. Successful exploitation allows remote SSH servers to cause a denial of service (crash) and possibly trigger memory corruption or code ...

The host is installed with PuTTY before 0.63 and is prone to buffer overflow vulnerability. The flaw is present in the application, which is not properly handled during computation of a modular inverse and triggers the overflow during a division by zero by the bignum functionality. Successful exploitation allows remote SSH servers to cause a denial of service (crash).

The host is installed with PuTTY before 0.63 and is prone to information disclosure vulnerability. The flaw is present in the rsa_verify function in PuTTY, which does not clear sensitive process memory after use and (2) does not free certain structures containing sensitive process memory. Successful exploitation might allow local users to discover private RSA and DSA keys.


Pages:      Start    1130    1131    1132    1133    1134    1135    1136    1137    1138    1139    1140    1141    1142    1143    ..   1185

© 2013 SecPod Technologies