[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26381 Download | Alert*

The host is installed with Wireshark 1.12.x before 1.12.11 or 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the PKTC dissector, which fails to verify BER identifiers. Successful exploitation allows remote attackers to cause a denial of service (out-of-bounds read and application crash).

The host is installed with Wireshark 1.12.x before 1.12.11 or 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the PKTC dissector, which misparses timestamp fields. Successful exploitation allows remote attackers to cause a denial of service (out-of-bounds read and application crash).

The host is installed with Wireshark 1.12.x before 1.12.11 or 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the IAX2 dissector, which uses an incorrect integer data type. Successful exploitation allows remote attackers to cause a denial of service (infinite loop).

The host is installed with Wireshark 1.12.x before 1.12.11 or 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the GSM CBCH dissector, which uses the wrong variable to index an array. Successful exploitation allows remote attackers to cause a denial of service (out-of-bounds access and application crash).

The host is installed with Wireshark 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the MS-WSP dissector, which fails to ensure that data is available before array allocation. Successful exploitation allows remote attackers to cause a denial of service (application crash).

The host is installed with Wireshark 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the MS-WSP dissector, which fails to handle a crafted packet that triggers an unexpected array size. Successful exploitation allows remote attackers to cause a denial of service (integer overflow and application crash).

The host is installed with Wireshark 1.12.x before 1.12.11 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the NCP dissector, which fails to handle a long string in a packet. Successful exploitation could allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.

The host is installed with Apache Subversion 1.0.x before 1.8.15 and is prone to a null pointer dereference vulnerability. A flaw is present in the application, which fails to handle a crafted header in a MOVE or COPY request. Successful exploitation could allow remote attackers to cause a denial of service (NULL pointer dereference and crash).

PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to read arbitrary files via crafted input to an application that calls the stream_resolve_include_path function in ext/standard/streamsfuncs.c, as demonstrated by a filename\0.extension attack that bypasses an intended configuration in which client us ...

The __PHP_Incomplete_Class function in ext/standard/incomplete_class.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unexpected data type, related to a "type confusion" issue.


Pages:      Start    1492    1493    1494    1495    1496    1497    1498    1499    1500    1501    1502    1503    1504    1505    ..   2638

© SecPod Technologies