[Forgot Password]
Login  Register Subscribe

24003

 
 

131401

 
 

103942

 
 

909

 
 

83962

 
 

133

 
 
Paid content will be excluded from the download.

Filter
Matches : 234 Download | Alert*

The host is installed with e2fsprogs before 1.42.9-7 on Redhat Enterprise Linux 7 and before 1.42.12-21 on Redhat Enterprise Linux 6 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which causes a crafted block group descriptor to be marked as dirty. Successful exploitation allows local users to execute arbitrary code.

The host is installed with sox in RHEL 5, 6 or 7 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly process NIST Sphere and WAV audio files. Successful exploitation could allow attackers to execute arbitrary code with the privileges of the user running SoX.

The host is installed with mpfr in RHEL 6 or 7 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly allocate buffer. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with libgcrypt before 1.5.4 and is prone to an unspecified vulnerability. A flaw is present in the application, which does not properly perform ciphertext normalization and ciphertext randomizations. Successful exploitation makes it easier for physically proximate attackers to conduct key-extraction attacks by leveraging the ability to collect voltage data from exposed metal.

The host is installed with kernel on RHEL 5, 6, or 7 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle kernel's virtio-net handled fragmented packets. Successful exploitation could allow attackers to send crafted packets to a target system.

The host is installed with qemu-kvm on Red Hat Enterprise Linux 7 and is prone to an out-of-bounds memory access vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with RHEL 7 and is prone to an information leak vulnerability. A flaw is present in the application, which fails to properly handle NM (aka alternate name) entries containing \\0 characters. Successful exploitation could allow attackers to disclose sensitive information.

The host is installed with RHEL 5 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle invalid utf-8 encoded data. Successful exploitation could allow attackers to crash the service.

The host is installed with Perl on RHEL 5, 6 or 7 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploiation could allow attackers to access directories without permissions.

The host is installed with kernel on RHEL 6, or 7 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle IRET faults in processing NMIs that occurred during userspace execution. Successful exploitation could allow attackers to gain privileges.


Pages:      Start    3    4    5    6    7    8    9    10    11    12    13    14    15    16    ..   23

© 2013 SecPod Technologies