[Forgot Password]
Login  Register Subscribe

24436

 
 

131815

 
 

115228

 
 

909

 
 

90122

 
 

140

 
 
Paid content will be excluded from the download.

Filter
Matches : 13539 Download | Alert*

The host is installed with PHP and is prone to vulnerability. A flaw is present in the iconv_mime_decode_headers function in the Iconv extension in PHP before 5.3.4 where the function skips the headers that are unrecognized by the iconv and mbstring implementations. Successful exploitation allows attackers to trigger an incomplete output array via a crafted Subject header in an e-mail message.

The host is installed with PHP and is prone to use-after-free vulnerability. A flaw is present in the Zend engine in PHP before 5.2.15 and 5.3.x before 5.3.4 where objects that are unreferenced by __set, __get, __isset, and __unset methods are freed early, which leads to heap memory corruption. Successful exploitation will allow attackers to cause a denial of service condition.

The host is installed with OpenSSH and is prone to denial of service vulnerability. A flaw is present in sftp-glob.c and sftp.c, which fail to validate the pathnames passed to its functions. Successful exploitation could allow remote attackers to cause a denial of service.

The host is installed with Mozilla Firefox and is prone to denial of service vulnerability. A flaw is present in the WebSockets implementation, which fails to handle proxy upgrade negotiation. Successful exploitation could allow remote attackers to execute arbitrary code and cause denial of service.

The host is installed with Microsoft Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2 and is prone to elevation of privilege vulnerability. A flaw is present in Microsoft Windows, which fails to handle proper interaction of drivers with the Windows kernel. Successful exploitation allows attackers to run arbitrary code in kernel mode and take co ...

The host is installed with Apache Tomcat and is prone to cross-site scripting vulnerability. A flaw is present in the default configuration, which fails to set httpOnly flag in the Set-Cookie header. Successful exploitation allow remote attacker to hijack a session via script access to a cookie.

The host is installed with Microsoft Internet Explorer is prone to Cascading Style Sheets (CSS) memory corruption vulnerability. A flaw is present in the application, which fails to properly handle recursive memory access while importing a CSS. Successful exploitation could allow attackers to gain the same user rights as a local user using a crafted webpage. If attacker gains administrator rights, ...

The host is installed with Microsoft FTP Service for Internet Information Services (IIS) and is prone to heap buffer overrun vulnerability.A flaw is present in the TELNET_STREAM_CONTEXT::OnSendData function in the FTP protocol handler (ftpsvc.dll), which fails to properly handle a crafted FTP request that triggers memory corruption. Successful exploitation could allow attackers to execute arbitrar ...

The host is installed with Microsoft Graphics Rendering Engine and is prone to stack-based buffer overflow vulnerability. A flaw is present in the "CreateSizedDIBSECTION()" function within the "shimgvw.dll" module, which fails to properly parse a malformed thumbnail image. Successful exploitation could allow remote attackers to execute arbitrary code and take complete control over the system by tr ...

The host is installed with Microsoft Windows and is prone to remote code execution vulnerability. A flaw is present in Windows Fax cover page editor, which fails to parse specially created fax cover pages. Successful exploitation could remote code execution.


Pages:      Start    1299    1300    1301    1302    1303    1304    1305    1306    1307    1308    1309    1310    1311    1312    ..   1353

© SecPod Technologies