[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15134 Download | Alert*

The host is installed with libXi before 1.7.2 and is prone to multiple array index vulnerabilities. The flaws are present in the application, which fails to properly handle crafted length or index values. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with libX11 before 1.5.99.902 and is prone to multiple array index vulnerabilities. The flaws are present in the application, which fails to properly handle crafted length or index values. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with libX11 before 1.5.99.902 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle unbounded recursion. Successful exploitation could allow attackers to crash the service.

The host is installed with Common Unix Printing System (CUPS) before 1.7.2 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to handle a crafted URL patch. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with libX11 before 1.5.99.901 and is prone to multiple integer overflow vulnerabilities. The flaws are present in the application, which fails to properly handle vectors related to the (1) XQueryFont, (2) _XF86BigfontQueryFont, (3) XListFontsWithInfo, (4) XGetMotionEvents, (5) XListHosts, (6) XGetModifierMapping, (7) XGetPointerMapping, (8) XGetKeyboardMapping, (9) XGetWindow ...

The host is installed with freeradius2 or freeradius 2.x through 2.2.3 or 3.x through 3.0.1 and is prone to a stack-based buffer overflow vulnerability. The flaws are present in the applications, which fail to properly handle a long password hash, as demonstrated by an SSHA hash. Successful exploitation might allow attackers to cause a denial of service (crash).

The host is installed with hivex before 1.3.11 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a small hive files, which triggers an out-of-bounds read or write. Successful exploitation allows local users to execute arbitrary code and gain privileges.

The host is installed with Google Chrome before 19.0.1084.46 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly mitigate an unspecified flaw in an NVIDIA driver. Successful exploitation has unknown impact and attack vectors.

The host is installed with Google Chrome before 19.0.1084.46 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly mitigate an unspecified flaw in an NVIDIA driver. Successful exploitation has unknown impact and attack vectors.

CKEditor 4.x before 4.11.0 allows user-assisted XSS involving a source-mode paste.


Pages:      Start    992    993    994    995    996    997    998    999    1000    1001    1002    1003    1004    1005    ..   1513

© SecPod Technologies