[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249966

 
 

909

 
 

195636

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15149 Download | Alert*

The host is installed with tcptrack before 1.4.2 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a long command line argument. Successful exploitation could allow attackers to execute arbitrary code.

ihex.c in GNU Binutils before 2.26 contains a stack buffer overflow when printing bad bytes in Intel Hex objects.

The host is installed with EMC AutoStart 5.3.x or 5.4.x before 5.4.3 and is prone to Multiple buffer overflow vulnerabilities. The flaws are present in the application, which fails to handle malicious packets. Successful exploitation allows remote attackers to cause a denial of service (agent crash) or possibly execute arbitrary code via crafted packets.

The host is installed with Novell File Reporter before 1.0.2.53 and is prone to stack-based buffer overflow vulnerability. A flaw is present in the application when parsing tags inside the <RECORD> element, the application lacks a size check before pushing strings to a memory. Successful exploitation allows remote attacker to execute arbitrary code on the target system.

The dex_parse_debug_item function in libr/bin/p/bin_dex.c in radare2 1.2.1allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted DEX file.

dhcpcd before 6.10.0 allows remote attackers to cause a denial of service via vectors related to the option length.

dhcpcd before 6.10.0, as used in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-04-01 and other products, mismanages option lengths, which allows remote attackers to execute arbitrary code or cause a denial of service via a malformed DHCP response, aka internal bug 26461634.

Dave Gamble cJSON version 1.7.6 and earlier contains a CWE-772 vulnerability in cJSON library that can result in Denial of Service . This attack appear to be exploitable via If the attacker can force the data to be printed and the system is in low memory it can force a leak of memory. This vulnerability appears to have been fixed in 1.7.7.

An issue was discovered in apng2gif 1.7. There is an integer overflow resulting in a heap-based buffer overflow. This is related to the read_chunk function making an unchecked addition of 12.

The asn1f_lookup_symbol_impl function in asn1fix_retrieve.c in libasn1fix.a in asn1c 0.9.28 allows remote attackers to cause a denial of service via a crafted .asn1 file.


Pages:      Start    1493    1494    1495    1496    1497    1498    1499    1500    1501    1502    1503    1504    1505    1506    ..   1514

© SecPod Technologies