[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 307 Download | Alert*

The host is installed with Apache Subversion 1.0.0 through 1.7.x before 1.7.17 or 1.8.x before 1.8.10 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a crafted authentication realm. Successful exploitation makes it easier for remote servers to obtain the credentials.

The host is installed with glibc before 2.20 and is prone to an use-after-free vulnerabilities. The flaws are present in the application, which does not copy its path argument in accordance with the POSIX specification. Successful exploitation allows context-dependent attackers to trigger use-after-free vulnerabilities.

The host is installed with GnuPG 1.x before 1.4.17 and 2.x before 2.0.24 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle malformed compressed packets, as demonstrated by an a3 01 5b ff byte sequence. Successful exploitation allows context-dependent attackers to cause a denial of service.

The host is installed with Mozilla Network Security Services (NSS) before 3.16.2.4 or 3.17.x before 3.17.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which does not ensure that the DER encoding of an ASN.1 length is properly formed. Successful exploitation allows remote attackers to conduct data-smuggling attacks by using a long byte sequence for an encodin ...

The host is installed with php before 5.4.36, 5.5.x before 5.5.20 or 5.6.x before 5.6.4 and is prone to an use-after-free vulnerability. The flaw is present in the application, which fails to properly handle a crafted unserialize call that leverages improper handling of duplicate keys within the serialized properties of an object. Successful exploitation allows remote attackers to execute arbitrar ...

The host is installed with kernel-xen through 2.6.18 and is prone to a denial of service vulnerability. A flaw is present in the application, which does not properly handle unspecified vectors. Successful exploitation allows local HVM guests to cause a denial of service (host crash).

The host is installed with Squid and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the applications, which fails to handle crafted UDP SNMP request. Successful exploitation allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code.

The host is installed with ntp on RHEL 6 or 7 and is prone to an IP ACLs bypass vulnerability. A flaw is present in the application, which fails to properly handle spoofed packets with ::1 source address. Successful exploitation could allow attackers to bypass source IP ACLs on some OSes.

The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli.

A flaw was discovered in the cryptographic receive code in the Linux kernel's implementation of transparent interprocess communication. An attacker, with the ability to send TIPC messages to the target, can corrupt memory and escalate privileges on the target system.


Pages:      Start    8    9    10    11    12    13    14    15    16    17    18    19    20    21    ..   30

© SecPod Technologies