[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248038

 
 

909

 
 

194772

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26566 Download | Alert*

The host is installed with Oracle MySQL 5.5.x through 5.5.43 or MySQL 5.6.x through 5.6.23 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to Server : Pluggable Auth. Successful exploitation allows remote authenticated users to affect confidentiality.

The host is installed with Oracle MySQL 5.5.x through 5.5.42 or MySQL 5.6.x through 5.6.23 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to Server : Optimizer. Successful exploitation allows remote authenticated users to affect availability.

The host is installed with OpenSSH before 7.1p2 and is prone to denial of service vulnerability. A flaw is present in ssh_packet_read_poll2 function in packet.c in the client, which fails to validate the pathnames passed to its functions. Successful exploitation could allow remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.

The host is installed with Oracle VM VirtualBox from 4.3.x before 4.3.36 or 5.0.x and before 5.0.14 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to core. Successful exploitation could allows local users to affect availability

The host is installed with Oracle VM VirtualBox from 4.3.x before 4.3.36 or 5.0.x and before 5.0.14 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to core. Successful exploitation could allows local users to affect availability

The host is installed with OpenSSL 1.0.1 before 1.0.1r or 1.0.2 before 1.0.2f and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle SSL_OP_SINGLE_DH_USE option. Successful exploitation allows remote attackers to crash the service or lower the performance.

The host is installed with OpenSSH before 7.2p2 and is prone to multiple CRLF injection vulnerabilities. The flaws are present in session.c in sshd, which fails to handle crafted X11 forwarding data, related to the (1) do_authenticated1 and (2) session_x11_req functions. Successful exploitation could allow remote authenticated users to bypass intended shell-command restrictions.

The host is installed with OpenSSH through 7.2p2 and is prone to a privilege escalation vulnerability. A flaw is present in session.c in sshd, which fails to handle an LD_PRELOAD environment variable. Successful exploitation could allow local users to gain privileges by triggering a crafted environment for the /bin/login program.

The host is installed with Apache HTTP Server 2.4.x before 2.4.10 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails when the default AcceptFilter is enabled. Successful exploitation could allow remote attackers to cause a denial of service (memory consumption) via crafted requests.

The host is installed with OpenSSL 1.1.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle SSL_peek(). Successful exploitation allows remote attackers to cause a denial of service.


Pages:      Start    1165    1166    1167    1168    1169    1170    1171    1172    1173    1174    1175    1176    1177    1178    ..   2656

© SecPod Technologies