[Forgot Password]
Login  Register Subscribe

24003

 
 

131425

 
 

104705

 
 

909

 
 

84119

 
 

133

 
 
Paid content will be excluded from the download.

Filter
Matches : 12108 Download | Alert*

The host is installed with Mozilla Firefox before 37.0 and is prone to multiple unspecified vulnerabilities. The flaws are present in the application, which fails to handle unknown vectors. Successful exploitation could allow attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code.

The host is installed with Apache Subversion 1.0.0 through 1.7.x before 1.7.18 or 1.8.x before 1.8.10 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a crafted authentication realm. Successful exploitation could allow remote servers to obtain the credentials.

The host is installed with Python 3.2 through 3.5 and is prone to a race condition vulnerability. A flaw is present in the application, which fails to properly handle crafted input. Successful exploitation could allow attackers to crash the service.

The host is installed with VideoLAN VLC Media Player before 2.1.3 and is prone to divide-by-zero error vulnerability. A flaw is present in the application, which fails to handle a zero minimum and maximum data packet size in an ASF file. Successful exploitation allows attackers to cause a denial of service.

The host is installed with Python 3.3.x before 3.3.3 and is prone to denial of service vulnerability. The flaw is present in the application, which fails to properly handle a file size value larger than the size of the zip file to the (1) ZipExtFile.read, (2) ZipExtFile.read(n), (3) ZipExtFile.readlines, (4) ZipFile.extract, or (5) ZipFile.extractall function. Successful exploitation allows remote ...

The host is installed with OpenVPN 2.3.0 and earlier are prone to information disclosure vulnerability. The flaw is present in the application, which fails to properly handle the openvpn_decrypt function in crypto.c. Successful exploitation allows remote attackers to cause timing attack involving an HMAC comparison function that does not run in constant time and a padding oracle attack on the CBC ...

The host is installed with 2.x before 2.0.11, 2.1.x, 2.2.x before 2.2.3, or 2.3.x before 2.3.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a small control channel packet. Successful exploitation allows remote attackers to crash the service.

The host is installed with OpenVPN before 2.3.12 and is prone to an information disclosure vulnerability. The flaw is present in the application, which fails to properly handle the 64-bit block ciphers such as 3DES and Blowfish. Successful exploitation allows remote attackers to recover plaintext when the same data is sent and can use cross-site scripting vulnerabilities to send data of interest.

The host is installed with OpenVPN version greater than or equal to 2.3.12 and less than 2.3.15 or 2.4.x before 2.4.2 and is prone to Denial of service vulnerability. A flaw is present in the application, which fails to properly handle the unspecified vector. Successful exploitation could allow attackers to cause denial of service.

The host is installed with OpenVPN versions before 2.3.15 or 2.4.x before 2.4.2 and is prone to Denial of service vulnerability. A flaw is present in the application, which fails to properly handle unspecified vector. Successful exploitation could allow attackers to cause denial of service.


Pages:      Start    1121    1122    1123    1124    1125    1126    1127    1128    1129    1130    1131    1132    1133    1134    ..   1210

© 2013 SecPod Technologies