[Forgot Password]
Login  Register Subscribe

24437

 
 

132035

 
 

118831

 
 

909

 
 

92766

 
 

143

 
 
Paid content will be excluded from the download.

Filter
Matches : 246 Download | Alert*

The host is installed with Python Imaging Library (PIL) and Pillow before 2.3.2 and 2.5.x before 2.5.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted block size. Successful exploitation allows remote attackers to cause a denial of service.

The host is installed with GnuPG 1.x before 1.4.17 and 2.x before 2.0.24 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle malformed compressed packets, as demonstrated by an a3 01 5b ff byte sequence. Successful exploitation allows context-dependent attackers to cause a denial of service.

The host is installed with qt, qt3 or qt4 before 5.3 and is prone to a denial of service vulnerability. A flaw is present in the applications, which fail to properly handle invalid width and height values in a GIF image. Successful exploitation allows remote attackers to cause a denial of service (NULL pointer dereference).

The host is installed with sendmail before 8.14.9 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle a custom mail-delivery program. Successful exploitation allows local users to access unintended high-numbered file descriptors.

The host is installed with freeradius2 or freeradius 2.x through 2.2.3 or 3.x through 3.0.1 and is prone to a stack-based buffer overflow vulnerability. The flaws are present in the applications, which fail to properly handle a long password hash, as demonstrated by an SSHA hash. Successful exploitation might allow attackers to cause a denial of service (crash).

The host is installed with Mozilla Network Security Services (NSS) before 3.16.2.4 or 3.17.x before 3.17.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which does not ensure that the DER encoding of an ASN.1 length is properly formed. Successful exploitation allows remote attackers to conduct data-smuggling attacks by using a long byte sequence for an encodin ...

The host is installed with kernel-xen through 2.6.18 and is prone to a denial of service vulnerability. A flaw is present in the application, which does not properly handle unspecified vectors. Successful exploitation allows local HVM guests to cause a denial of service (host crash).

The host is installed with Python Image Library (PIL) 1.1.7 and earlier and Pillow 2.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle shell metacharacters in unspecified vectors related to CVE-2014-1932, possibly JpegImagePlugin.py. Successful exploitation allows remote attackers to execute arbitrary commands.

The host is installed with Exiv2 0.24 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a long IKEY INFO tag value in an AVI file. Successful exploitation allows remote attackers to cause a denial of service (crash).

The host is installed with xen through 3.0.3-142 and is prone to a denial of service vulnerability. A flaw is present in x86 emulator in xen, which does not properly ignore segment overrides for instructions with register operands. Successful exploitation allows local guest users to obtain sensitive information or possibly execute arbitrary code via unspecified vectors.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   24

© SecPod Technologies