[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15162 Download | Alert*

The host is installed with Wireshark 1.8.x before 1.8.9 or 1.10.x before 1.10.1 and is prone to denial of service vulnerability. A flaw is present in the dissect_dvbci_tpdu_hdr function in epan/dissectors/packet-dvbci.c in the DVB-CI dissector in wireshark, which does not validate a certain length value before decrementing it. Successful exploitation allows attackers to cause a denial of service ( ...

The host is installed with Oracle Weblogic Server 12.2.1.3 and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to handle unauthenticated network access via HTTP. Successful exploitation allows an attacker to gain control over server data and cause a partial denial-of-service.

Google Chrome before 7.0.517.41 does not properly handle animated GIF images, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted image.

Google Chrome before 7.0.517.41 does not properly handle the unloading of a page, which allows remote attackers to spoof URLs via unspecified vectors.

Google Chrome before 6.0.472.59 does not properly implement Geolocation, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.

The host is installed with PostgreSQL 9.3.3 or earlier versions and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly invoke initdb to specify the authentication requirements for a database cluster to be used for the tests. Successful exploitation allow local users to gain privileges by leveraging access to this cluster.

The host is installed with Apache HTTP Server 2.4.17 through 2.4.23 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle exceptional conditions. Successful exploitation could allow remote attackers to cause a denial of service.

The host is installed with Apache HTTP Server 2.4.17 or 2.4.18 and is prone to a remote denial of service vulnerability. A flaw is present in the application, which fails to handle exceptional conditions. Successful exploitation could allow remote attackers to cause a denial of service.

The host is installed with Apache HTTP Server 2.4.25 and is prone to a NULL pointer dereference vulnerability. A flaw is present in the application, which fails to properly handle a maliciously constructed HTTP/2 request. Successful exploitation could allow attackers to dereference a NULL pointer and crash the server process.

The host is installed with Apache OpenOffice 4.1.2 or earlier and is prone to an out-of-bounds memory access vulnerability. A flaw is present in the application, which fails to handle crafted MetaActions in an (1) ODP or (2) OTP file. Successful exploitation could allow attackers to crash the service.


Pages:      Start    1315    1316    1317    1318    1319    1320    1321    1322    1323    1324    1325    1326    1327    1328    ..   1516

© SecPod Technologies