[Forgot Password]
Login  Register Subscribe

23631

 
 

126941

 
 

98503

 
 

909

 
 

79321

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 11886 Download | Alert*

The host is installed with Novell iPrint Client before 5.82 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle an op-client-interface-version action. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Axigen Free Mail Server and is prone to multiple directory traversal vulnerabilities. The flaws are present in the application, which fails to handle the View Log Files component. Successful exploitation allows attackers to read or delete arbitrary files via a .. (dot dot) in the fileName parameter in a download action to source/loggin/page_log_dwn_file.hsp, or the fileN ...

The host is installed with PHP and is prone to integer overflow vulnerability. A flaw is present in the numfmt_get_symbol function, which fails to handle invalid arguments. Successful exploitation could allow remote attacker to cause denial of service.

The host is installed with PHP and is prone to information disclosure vulnerability. A flaw is present in the mb_strcut() function, which fails to handle overly large value passed to the length parameter. Successful exploitation could allow remote attackers to obtain sensitive information.

The host is installed with PHP and is prone to Denial of Service vulnerability. The falw is due to Buffer overflow in the strval function, when the precision configuration option has a large value. Successful exploitation could allow remote attackers to a denial of service via a small numerical value in the argument.

The host is installed with PHP and is prone to Denial of Service vulnerability. The flaw is due to Unspecified vulnerability in the NumberFormatter::setSymbol in the Intl extension in PHP. Successful exploitation could allow remote attackers to cause a denial of service via an invalid argument

The host is installed with PHP and is prone to Denial of Service vulnerability. The flaw is caused due to integer overflow in the SdnToJulian function in the Calendar extension in PHP. Successful exploitation could allow remote attackers to cause a denial of service via a large integer in the first argument to the cal_from_jd function.

The host is installed with PHP and is prone to denial of service vulnerability on windows. The flaw is due to memory leaks while using openssl_decrypt and openssl_encrypt functions. Successful exploitation could allow remote attackers to a denial of service

The host is installed with PHP and is prone to Denial of Service vulnerability. The falw is due to unspecified vulnerability in the Streams component. Successful exploitation could allow remote attackers to cause a denial of service by accessing an ftp:// URL during use of an HTTP proxy with the FTP wrapper.

The host is installed with PHP and is prone to Denial of Service vulnerability. The flaw is present in stream_get_contents function, which fails to handle ziparchive stream. Successful exploitation could allow remote attackers to cause a denial of service via a ziparchive stream.


Pages:      Start    1146    1147    1148    1149    1150    1151    1152    1153    1154    1155    1156    1157    1158    1159    ..   1188

© 2013 SecPod Technologies