[Forgot Password]
Login  Register Subscribe

23631

 
 

126951

 
 

99602

 
 

909

 
 

80198

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 233 Download | Alert*

The host is installed with kernel before 2.6.38 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted instruction that triggers an L2 emulation failure report. Successful exploitation allow remote attackers to cause a denial of service (crash).

The host is installed with Linux kernel through 3.13.6 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to obtain sensitive information from kernel memory.

The host is installed with Linux kernel through 3.17.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which miscalculates the number of pages during the handling of a mapping failure. Successful exploitation allows guest OS users to cause a denial of service (host OS page unpinning) or possibly have unspecified other impact.

The host is installed with mariadb and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle multiple protocols. Successful exploitation could allow attackers to crash the service.

The host is installed with ntp on Red Hat Enterprise Linux 6 or 7 and is prone to an information leak vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation after several attempts could allow attackers to disclose sensitive information

The host is installed with ntp on Red Hat Enterprise Linux 6 or 7 and is prone to an information leak vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation after several attempts could allow attackers to disclose sensitive information

The host is installed with kernel on RHEL 7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a special stack layout that will force the perf_callchain_user_64 function into an infinite loop. Successful exploitation could allow attackers to crash the service.

The host is installed with kernel on Red Hat Enterprise Linux 7 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted microcode header. Successful exploitation could allow attackers to escalate privileges on the affected system.

The host is installed with kernel on RHEL 7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle many add_key system calls that refer to existing keys. Successful exploitation could allow attackers to crash the service.

The host is installed with hivex before 1.3.11 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a small hive files, which triggers an out-of-bounds read or write. Successful exploitation allows local users to execute arbitrary code and gain privileges.


Pages:      Start    7    8    9    10    11    12    13    14    15    16    17    18    19    20    ..   23

© 2013 SecPod Technologies