[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247621

 
 

909

 
 

194512

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26530 Download | Alert*

The host is installed with Subversion 1.0.0 through 1.6.20 or 1.7.0 through 1.7.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle an anonymous LOCK for a URL that does not exist. Successful exploitation could allow attackers to crash the service.

The host is installed with Subversion 1.0.0 through 1.6.20 or 1.7.0 through 1.7.8 and is prone to memory consumption vulnerability. A flaw is present in the application, which fails to handle (1) setting or (2) deleting a large number of properties for a file or directory. Successful exploitation could allow attackers to crash the service.

The host is installed with Subversion before 1.5.0 before 1.5.8 or 1.6.0 before 1.6.15 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a named repository as a rule scope. Successful exploitation could allow attackers to bypass intended access restrictions via svn commands.

The host is installed with OpenSSL 1.0.1 before 1.0.1i and is prone to denial of service vulnerability. The flaw is present in t1_lib.c in OpenSSL, which fails to properly handle a ServerHello message that includes an SRP ciphersuite without the required negotiation of that ciphersuite with the client. Successful exploitation allows remote SSL servers to cause a denial of service.

The host is installed with OpenSSL 1.0.1 before 1.0.1i and is prone to denial of service vulnerability. The flaw is present in crypto/srp/srp_lib.c in the SRP implementation in OpenSSL, which fails to properly handle an invalid SRP (1) g, (2) A, or (3) B parameter. Successful exploitation allows remote attackers to cause a denial of service.

The host is installed with OpenSSL 1.0.1 before 1.0.1i and is prone to man-in-the-middle vulnerability. The flaw is present in ssl23_get_client_hello function in s23_srvr.c in OpenSSL, which fails to properly handle message fragmentation in communication between a client and server. Successful exploitation allows man-in-the-middle attackers to force the use of TLS.

The host is installed with OpenSSL 1.0.0 before 1.0.0n or 1.0.1 before 1.0.1i and is prone to denial of service vulnerability. The flaw is present in the ssl_parse_serverhello_tlsext function in t1_lib.c in OpenSSL, which fails to handle race condition in the ssl_parse_serverhello_tlsext function. Successful exploitation allows remote SSL servers to cause a denial of service (memory overwrite and ...

The host is installed with OpenSSL before 0.9.8zb, 1.0.0 before 1.0.0n or 1.0.1 before 1.0.1i and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted handshake message in conjunction with a (1) anonymous DH or (2) anonymous ECDH ciphersuite. Successful exploitation allows remote DTLS servers to cause a denial of service.

The host is installed with OpenSSL before 0.9.8zb, 1.0.0 before 1.0.0n or 1.0.1 before 1.0.1i and is prone to information disclosure vulnerability. A flaw is present in the application, which does not ensure the presence of '\0' characters. Successful exploitation allows context-dependent attackers to obtain sensitive information from process stack memory.

The host is installed with OpenSSL before 0.9.8zb, 1.0.0 before 1.0.0n or 1.0.1 before 1.0.1i and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle zero-length DTLS fragments that trigger improper handling of the return value of a certain insert function. Successful exploitation allows context-dependent attackers to obtain sensitive i ...


Pages:      Start    1176    1177    1178    1179    1180    1181    1182    1183    1184    1185    1186    1187    1188    1189    ..   2652

© SecPod Technologies