[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

114411

 
 

909

 
 

88812

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 12811 Download | Alert*

The host is installed with Wireshark 1.4.x before 1.4.13 or 1.6.x before 1.6.8 and is prone to multiple integer underflow vulnerabilities. The flaws are present in the application, which fails to handle vectors related to the R3 dissector. Successful exploitation allows remote attackers to cause a denial of service.

The host is installed with PHP 5.4.x before 5.4.3 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a long string in the header of an HTTP request. Successful exploitation could allow attackers to crash the service.

The host is installed with Pidgin-otr plugin before 3.2.1-1 for Pidgin and is prone to format string vulnerability. A flaw is present in the Off-the-Record Messaging (OTR) pidgin-otr plugin, which fails to handle format string specifiers in data that generates a log message. Successful exploitation could allow remote attackers to execute arbitrary code.

The host is installed with Wireshark 1.4.x before 1.4.12 or 1.6.x before 1.6.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle epan/dissectors/packet-ansi_a.c in the ANSI A dissector. Successful exploitation could allow remote attackers to cause denial of service NULL pointer dereference or application crash via a malformed packet.

The host is installed with Wireshark 1.6.x before 1.6.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle epan/dissectors/packet-ieee80211.c in the IEEE 802.11 dissector. Successful exploitation could allow remote attackers to cause denial of service (infinite loop).

The host is installed with Wireshark 1.4.x before 1.4.12 or 1.6.x before 1.6.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the mp2t_process_fragmented_payload function in epan/dissectors/packet-mp2t.c in the MP2T dissector. Successful exploitation could allow remote attackers to cause denial of service or application crash.

The host is installed with Wireshark 1.4.x before 1.4.11 or 1.6.x before 1.6.5 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle reassemble_message function in epan/dissectors/packet-rlc.c in the RLC dissector. Successful exploitation could allow remote attackers to cause denial of service or application crash or possibly execute arbitrary c ...

The host is installed with OpenSSL and is prone to remote code execution vulnerability. A flaw is present in Cryptographic Message Syntax (CMS) implementation, which fails to handle structures that contain OriginatorInfo element. Successful exploitation allows remote attackers to modify invalid memory locations or conduct double-free attacks or execute arbitrary code.

The host is installed with OpenSSL and is prone to security bypass vulnerability. A flaw is present in EVP_PKEY_verify_recover function, which returns uninitialized buffer instead of an error code when the verification recovery process fails. Successful exploitation allow remote attackers to bypass intended RSA key validation and obtain sensitive information.

The host is installed with Oracle Java 7 Update 17 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors involving reflection. Successful exploitation could allow attackers to execute arbitrary code.


Pages:      Start    1124    1125    1126    1127    1128    1129    1130    1131    1132    1133    1134    1135    1136    1137    ..   1281

© SecPod Technologies