[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250108

 
 

909

 
 

196064

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26295 Download | Alert*

The host is installed with OpenSSL 1.1.1 through 1.1.1p or 3.0.0 through 3.0.4 and is prone to an information disclosure vulnerability. A flaw is present in the AES OCB mode for 32-bit x86 which fails to properly encrypt the entirety of the data under some circumstances. On successful exploitation, it could reveal sixteen bytes of data that was preexisting in the memory that wasn't written. In the ...

The host is installed with OpenSSL 3.0.0 before 3.0.3 and is prone to an improper certificate validation vulnerability. A flaw is present in the application which fails to handle an issue in the OCSP_basic_verify function. Successful exploitation could allow an attacker to trick the command line application report that the verification of an ocsp response with the "-no_cert_checks" option to be su ...

The host is installed with OpenSSL 3.0.0 before 3.0.3 and is prone to a denial of service vulnerability. A flaw is present in the application which fails to handle an issue in the OPENSSL_LH_flush() function. Successful exploitation could allow an attacker to cause a long lived process when periodically decoding certificates or keys, its memory usage to expand without bounds and the process to be ...

The host is installed with Apache HTTP Server 2.4.0 through 2.4.46 and is prone to a heap overflow vulnerability. A flaw is present in the application, which fails to properly handle a specially crafted SessionHeader. Successful exploitation could allow attackers to cause a heap overflow.

The host is installed with Apache HTTP Server 2.4.41 through 2.4.46 and is prone to a stack overflow vulnerability. A flaw is present in the application, which fails to properly handle a specially crafted Digest nonce. Successful exploitation could allow attackers to cause a stack overflow in mod_auth_digest.

The host is installed with OpenSSL 1.0.2 through 1.0.2zc, 1.1.1 through 1.1.1m or 3.0.0 through 3.0.1 and is prone to an infinite loop vulnerability. A flaw is present in the BN_mod_sqrt() function, which computes a modular square root. Successful exploitation could allow attackers to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters.

The host is installed with Google Chrome before 103.0.5060.114 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Foxit PDF Reader through 12.1.2.15332 or Foxit PDF Editor through 10.1.12.37872 or 11.x through 11.2.6.53790 or 12.x through 12.1.2.15332 and is prone to a use after free vulnerability. A flaw is present in the applications which fails to properly handle certain JavaScripts. Successful exploitation allows attackers to cause memory corruption and execute remote code.

The host is installed with Foxit PDF Reader through 12.1.3.15356 or Foxit PDF Editor through 10.1.12.37872, 11.x through 11.2.7.53812, 12.x through 12.1.3.15356 or 2023.1.0.15510 and is prone to an use after free vulnerability. A flaw is present in the applications which fails to properly handle certain JavaScripts. Successful exploitation could allow attackers to execute remote code or disclose i ...

The host is installed with Foxit PDF Reader through 12.1.3.15356 or Foxit PDF Editor through 10.1.12.37872, 11.x through 11.2.7.53812, 12.x through 12.1.3.15356 or 2023.1.0.15510 and is prone to an use after free vulnerability. A flaw is present in the applications which fails to properly handle certain JavaScripts. Successful exploitation could allow attackers to execute remote code or disclose i ...


Pages:      Start    1259    1260    1261    1262    1263    1264    1265    1266    1267    1268    1269    1270    1271    1272    ..   2629

© SecPod Technologies