[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

112965

 
 

909

 
 

87888

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 13419 Download | Alert*

The host is installed with Wireshark 1.4.x before 1.4.12 or 1.6.x before 1.6.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle epan/dissectors/packet-ansi_a.c in the ANSI A dissector. Successful exploitation could allow remote attackers to cause denial of service NULL pointer dereference or application crash via a malformed packet.

The host is installed with Wireshark 1.6.x before 1.6.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle epan/dissectors/packet-ieee80211.c in the IEEE 802.11 dissector. Successful exploitation could allow remote attackers to cause denial of service (infinite loop).

The host is installed with Wireshark 1.4.x before 1.4.12 or 1.6.x before 1.6.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the mp2t_process_fragmented_payload function in epan/dissectors/packet-mp2t.c in the MP2T dissector. Successful exploitation could allow remote attackers to cause denial of service or application crash.

The host is installed with Puppet 2.6.x before 2.6.14 or 2.7.x before 2.7.11 and is prone to privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle k5login type. Successful exploitation allows attackers to gain privileges via a symlink attack on .k5login.

The host is installed with Puppet 2.6.x before 2.6.14 or 2.7.x before 2.7.11 and is prone to elevation of privilege vulnerability. A flaw is present in the application, which is caused by the improper dropping of group permissions when a process is forked. Successful exploitation allows attackers to execute arbitrary code on the system with root privileges.

The host is installed with Wireshark 1.4.x before 1.4.11 or 1.6.x before 1.6.5 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle reassemble_message function in epan/dissectors/packet-rlc.c in the RLC dissector. Successful exploitation could allow remote attackers to cause denial of service or application crash or possibly execute arbitrary c ...

The host is installed with OpenSSL and is prone to remote code execution vulnerability. A flaw is present in Cryptographic Message Syntax (CMS) implementation, which fails to handle structures that contain OriginatorInfo element. Successful exploitation allows remote attackers to modify invalid memory locations or conduct double-free attacks or execute arbitrary code.

The host is installed with OpenSSL and is prone to security bypass vulnerability. A flaw is present in EVP_PKEY_verify_recover function, which returns uninitialized buffer instead of an error code when the verification recovery process fails. Successful exploitation allow remote attackers to bypass intended RSA key validation and obtain sensitive information.

The host is installed with Oracle Java 7 Update 17 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors involving reflection. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Oracle Java 7 Update 17 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.


Pages:      Start    1144    1145    1146    1147    1148    1149    1150    1151    1152    1153    1154    1155    1156    1157    ..   1341

© SecPod Technologies