[Forgot Password]
Login  Register Subscribe

24003

 
 

131573

 
 

108741

 
 

909

 
 

85467

 
 

134

 
 
Paid content will be excluded from the download.

Filter
Matches : 15380 Download | Alert*

The host is installed with PHP and is prone to denial of service vulnerability on windows. The flaw is due to memory leaks while using openssl_decrypt and openssl_encrypt functions. Successful exploitation could allow remote attackers to a denial of service

The host is installed with Adobe Illustrator before CS6 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allow attackers to execute arbitrary code.

The host is installed with PHP and is prone to Denial of Service vulnerability. The flaw is caused due to integer overflow in the SdnToJulian function in the Calendar extension in PHP. Successful exploitation could allow remote attackers to cause a denial of service via a large integer in the first argument to the cal_from_jd function.

The host is installed with PHP and is prone to use-after-free vulnerability. A flaw is present in PHP before 5.3.4 which allows a NULL byte injection where anything after a null byte in a string is truncated. Successful exploitation allows an attacker to bypass intended access restrictions by placing a safe file extension after a NULL character.

The host is installed with PHP and is prone to Denial of Service vulnerability. The flaw is due to Unspecified vulnerability in the NumberFormatter::setSymbol in the Intl extension in PHP. Successful exploitation could allow remote attackers to cause a denial of service via an invalid argument

The host is installed with PHP and is prone to Denial of Service vulnerability. The falw is due to Buffer overflow in the strval function, when the precision configuration option has a large value. Successful exploitation could allow remote attackers to a denial of service via a small numerical value in the argument.

The host is installed with PHP and is prone to denial of service vulnerability on windows. The flaw is present in _zip_name_locate function in zip_name_locate.c in the Zip extension, which fails to handle a ZIPARCHIVE::FL_UNCHANGED argument

The host is installed with Google Chrome before 19.0.1084.52 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle vectors that trigger type corruption. Successful exploitation could allow attackers to crash the service.

The host is installed with Google Chrome before 19.0.1084.52 and is prone to multiple buffer overflow vulnerabilities. The flaws are present in the application, which fails to vectors that trigger unknown function calls. Successful exploitation could allow attackers to crash the service.

The host is installed with Google Chrome before 19.0.1084.52 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly perform a cast of an unspecified variable during handling of color spaces. Successful exploitation could allow attackers to crash the service.


Pages:      Start    1383    1384    1385    1386    1387    1388    1389    1390    1391    1392    1393    1394    1395    1396    ..   1537

© SecPod Technologies