[Forgot Password]
Login  Register Subscribe

24437

 
 

131950

 
 

117582

 
 

909

 
 

91563

 
 

143

 
 
Paid content will be excluded from the download.

Filter
Matches : 239 Download | Alert*

The host is installed with Graphviz 2.34.0 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle vectors related to a "badly formed number" and a "long digit list". Successful exploitation allows remote attackers to have unspecified impact.

The host is installed with FreeRDP through 1.0.2 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle a large ScopeCount value in a Scope List. Successful exploitation could allow attackers to a denial of service (application crash) or possibly have unspecified other impact.

The host is installed with qt 4.6.3 or earlier and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed request. Successful exploitation could allow attackers to crash the service.

The host is installed with libxcb before 1.9.1 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle vectors related to the read_packet function. Successful exploitation could allow attackers to trigger allocation of insufficient memory and a buffer overflow.

The host is installed with gnutls before 3.1.0 and is prone to a security bypass vulnerability. A flaw is present in the application, which does not verify that the RSA PKCS #1 signature algorithm matches the signature algorithm in the certificate. Successful exploitation could allow remote attackers to conduct downgrade attacks.

The host is installed with kernel through 3.18.1 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a crafted application. Successful exploitation local users to bypass the ASLR protection mechanism.

The host is installed with kernel through 3.18 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a crafted application that reads a 16-bit value. Successful exploitation makes it easier for guest OS users to bypass the ASLR protection mechanism.

The host is installed with Linux kernel through 3.17.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which miscalculates the number of pages during the handling of a mapping failure. Successful exploitation allows guest OS users to cause a denial of service (host OS page unpinning) or possibly have unspecified other impact.

The host is installed with Linux kernel through 3.13.6 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to obtain sensitive information from kernel memory.


Pages:      Start    14    15    16    17    18    19    20    21    22    23    ..   23

© SecPod Technologies