[Forgot Password]
Login  Register Subscribe

24003

 
 

131573

 
 

108684

 
 

909

 
 

85446

 
 

134

 
 
Paid content will be excluded from the download.

Filter
Matches : 12797 Download | Alert*

The host is installed with xArrow before 3.4.1 and is prone to a NULL pointer dereference vulnerability. A flaw is present in the application, which fails to properly allocate memory. Successful exploitation allows remote attackers to cause a denial of service.

The host is installed with xArrow before 3.4.1 and is prone to heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to do proper boundary checks. Successful exploitation allows remote attackers to execute arbitrary code via packets that trigger an invalid free operation.

The host is installed with xArrow before 3.4.1 and is prone to integer overflow vulnerability. A flaw is present in the application, which fails to perform proper bounds check. Successful exploitation allows remote attackers to execute arbitrary code via a crafted packet that triggers an out-of-bounds read operation.

The host is installed with PHP and is prone to Denial of Service vulnerability. The falw is due to unspecified vulnerability in the Streams component. Successful exploitation could allow remote attackers to cause a denial of service by accessing an ftp:// URL during use of an HTTP proxy with the FTP wrapper.

The host is installed with xArrow before 3.4.1 and is prone to out-of-bounds read vulnerability. A flaw is present in the application, which reads data from a memory location that is outside the intended boundary of buffer. Successful exploitation allows remote attackers to execute arbitrary code via unspecified vectors.

The host is installed with ScadaPro Server before 4.0.0 and is prone to untrusted search path vulnerability. A flaw is present in the application, which fails to handle a malicious DLL in a directory. Successful exploitation could allow local users to gain privileges.

The host is installed with PHP and is prone to denial of service vulnerability on windows. The flaw is due to memory leaks while using openssl_decrypt and openssl_encrypt functions. Successful exploitation could allow remote attackers to a denial of service

The host is installed with Adobe Illustrator before CS6 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allow attackers to execute arbitrary code.

The host is installed with PHP and is prone to Denial of Service vulnerability. The flaw is caused due to integer overflow in the SdnToJulian function in the Calendar extension in PHP. Successful exploitation could allow remote attackers to cause a denial of service via a large integer in the first argument to the cal_from_jd function.

The host is installed with PHP and is prone to use-after-free vulnerability. A flaw is present in PHP before 5.3.4 which allows a NULL byte injection where anything after a null byte in a string is truncated. Successful exploitation allows an attacker to bypass intended access restrictions by placing a safe file extension after a NULL character.


Pages:      Start    1145    1146    1147    1148    1149    1150    1151    1152    1153    1154    1155    1156    1157    1158    ..   1279

© SecPod Technologies