[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31089 Download | Alert*

The host is installed with Oracle MySQL 5.5.x through 5.5.43 or MySQL 5.6.x through 5.6.23 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to Server : Pluggable Auth. Successful exploitation allows remote authenticated users to affect confidentiality.

The host is installed with Oracle MySQL 5.5.x through 5.5.42 or MySQL 5.6.x through 5.6.23 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to Server : Optimizer. Successful exploitation allows remote authenticated users to affect availability.

The host is installed with OpenSSH before 7.1p2 and is prone to denial of service vulnerability. A flaw is present in ssh_packet_read_poll2 function in packet.c in the client, which fails to validate the pathnames passed to its functions. Successful exploitation could allow remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.

The host is installed with Oracle VM VirtualBox from 4.3.x before 4.3.36 or 5.0.x and before 5.0.14 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to core. Successful exploitation could allows local users to affect availability

The host is installed with Oracle VM VirtualBox from 4.3.x before 4.3.36 or 5.0.x and before 5.0.14 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to core. Successful exploitation could allows local users to affect availability

The host is installed with OpenSSL 1.0.1 before 1.0.1r or 1.0.2 before 1.0.2f and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle SSL_OP_SINGLE_DH_USE option. Successful exploitation allows remote attackers to crash the service or lower the performance.

The host is installed with OpenSSH before 7.2p2 and is prone to multiple CRLF injection vulnerabilities. The flaws are present in session.c in sshd, which fails to handle crafted X11 forwarding data, related to the (1) do_authenticated1 and (2) session_x11_req functions. Successful exploitation could allow remote authenticated users to bypass intended shell-command restrictions.

The host is installed with OpenSSH through 7.2p2 and is prone to a privilege escalation vulnerability. A flaw is present in session.c in sshd, which fails to handle an LD_PRELOAD environment variable. Successful exploitation could allow local users to gain privileges by triggering a crafted environment for the /bin/login program.

The host is installed with Apache HTTP Server 2.4.x before 2.4.10 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails when the default AcceptFilter is enabled. Successful exploitation could allow remote attackers to cause a denial of service (memory consumption) via crafted requests.

The host is installed with OpenSSL 1.1.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle SSL_peek(). Successful exploitation allows remote attackers to cause a denial of service.


Pages:      Start    1413    1414    1415    1416    1417    1418    1419    1420    1421    1422    1423    1424    1425    1426    ..   3108

© SecPod Technologies