[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26581 Download | Alert*

The host is installed with OpenSSL 1.0.1 before 1.0.1r or 1.0.2 before 1.0.2f and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle SSL_OP_SINGLE_DH_USE option. Successful exploitation allows remote attackers to crash the service or lower the performance.

The host is installed with OpenSSH before 7.2p2 and is prone to multiple CRLF injection vulnerabilities. The flaws are present in session.c in sshd, which fails to handle crafted X11 forwarding data, related to the (1) do_authenticated1 and (2) session_x11_req functions. Successful exploitation could allow remote authenticated users to bypass intended shell-command restrictions.

The host is installed with OpenSSH through 7.2p2 and is prone to a privilege escalation vulnerability. A flaw is present in session.c in sshd, which fails to handle an LD_PRELOAD environment variable. Successful exploitation could allow local users to gain privileges by triggering a crafted environment for the /bin/login program.

The host is installed with Apache HTTP Server 2.4.x before 2.4.10 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails when the default AcceptFilter is enabled. Successful exploitation could allow remote attackers to cause a denial of service (memory consumption) via crafted requests.

The host is installed with OpenSSL 1.1.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle SSL_peek(). Successful exploitation allows remote attackers to cause a denial of service.

The host is installed with OpenSSL 1.1.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle TLS Message. Successful exploitation allows remote attackers to cause a denial of service.

The host is installed with OpenSSL 1.1.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle DTLS Message. Successful exploitation allows remote attackers to cause a denial of service.

The host is installed with OpenSSL 1.1.0a and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to properly handle a crafted TLS session. Successful exploitation allows remote attackers to cause a denial of service (use-after-free) or possibly execute arbitrary code.

The host is installed with Mozilla Firefox ESR before 45.6 or Thunderbird before 45.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle add or remove of sub-documents. Successful exploitation allows remote attackers to crash the service.

The host is installed with Google Chrome before 18.0.1025.168 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly validate messages. Successful exploitation has unspecified impact and attack vectors.


Pages:      Start    1167    1168    1169    1170    1171    1172    1173    1174    1175    1176    1177    1178    1179    1180    ..   2658

© SecPod Technologies