[Forgot Password]
Login  Register Subscribe

24003

 
 

131486

 
 

106342

 
 

909

 
 

84645

 
 

134

 
 
Paid content will be excluded from the download.

Filter
Matches : 234 Download | Alert*

The host is installed with xen through 3.0.3-142 and is prone to a denial of service vulnerability. A flaw is present in x86 emulator in xen, which does not properly ignore segment overrides for instructions with register operands. Successful exploitation allows local guest users to obtain sensitive information or possibly execute arbitrary code via unspecified vectors.

The host is installed with e2fsprogs before 1.42.9-7 on Redhat Enterprise Linux 7 and before 1.42.12-21 on Redhat Enterprise Linux 6 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which causes a crafted block group descriptor to be marked as dirty. Successful exploitation allows local users to execute arbitrary code.

The host is installed with e2fsprogs before 1.42.9-7 on Redhat Enterprise Linux 7 and before 1.42.12-21 on Redhat Enterprise Linux 6 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which causes a crafted block group descriptor to be marked as dirty. Successful exploitation allows local users to execute arbitrary code.

The host is installed with php through 5.5.20 or 5.6.x through 5.6.4 and is prone to a double free vulnerability. The flaw is present in the in the zend_ts_hash_graceful_destroy function in zend_ts_hash.c in the Zend Engine, which fails to properly handle unknown vectors. Successful exploitation allows remote attackers to cause a denial of service or possibly have unspecified other impact.

The host is installed with Exiv2 0.24 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a long IKEY INFO tag value in an AVI file. Successful exploitation allows remote attackers to cause a denial of service (crash).

The host is installed with Python Image Library (PIL) 1.1.7 and earlier and Pillow 2.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle shell metacharacters in unspecified vectors related to CVE-2014-1932, possibly JpegImagePlugin.py. Successful exploitation allows remote attackers to execute arbitrary commands.

The host is installed with LibreOffice before 4.1.1 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle crafted OLE objects. Successful exploitation might allow remote attackers to embed arbitrary data into documents.

The host is installed with kernel-xen through 2.6.18 and is prone to a denial of service vulnerability. A flaw is present in the application, which does not properly handle unspecified vectors. Successful exploitation allows local HVM guests to cause a denial of service (host crash).

The host is installed with hivex before 1.3.11 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a small hive files, which triggers an out-of-bounds read or write. Successful exploitation allows local users to execute arbitrary code and gain privileges.

The host is installed with LibreOffice 4.x before 4.2.7 or 4.3.x before 4.3.3 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle a crafted request to TCP port 1599. Successful exploitation allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   23

© 2013 SecPod Technologies