[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

112965

 
 

909

 
 

87888

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 87855 Download | Alert*

linux: Linux kernel Several security issues were fixed in the Linux kernel.

The Apache HTTP Server is a powerful, efficient, and extensible web server.

The Apache HTTP Server is a powerful, efficient, and extensible web server.

By specially crafting HTTP requests, the mod_md challenge handler would dereference a NULL pointer and cause the child process to segfault. This could be used to DoS the server. Fixed in Apache HTTP Server 2.4.34 .

By specially crafting HTTP requests, the mod_md challenge handler would dereference a NULL pointer and cause the child process to segfault. This could be used to DoS the server. Fixed in Apache HTTP Server 2.4.34

CVE-2018-1333: DoS for HTTP/2 connections by crafted requests¶ By specially crafting HTTP/2 requests, workers would be allocated 60 seconds longer than necessary, leading to worker exhaustion and a denial of service. Fixed In Version:¶ Apache HTTP Server 2.4.34

CVE-2018-1333: DoS for HTTP/2 connections by crafted requests¶ By specially crafting HTTP/2 requests, workers would be allocated 60 seconds longer than necessary, leading to worker exhaustion and a denial of service. Fixed In Version:¶ Apache HTTP Server 2.4.34

CVE-2018-1333: DoS for HTTP/2 connections by crafted requests¶ By specially crafting HTTP/2 requests, workers would be allocated 60 seconds longer than necessary, leading to worker exhaustion and a denial of service. Fixed In Version:¶ Apache HTTP Server 2.4.34

CVE-2018-1333: DoS for HTTP/2 connections by crafted requests¶ By specially crafting HTTP/2 requests, workers would be allocated 60 seconds longer than necessary, leading to worker exhaustion and a denial of service. Fixed In Version:¶ Apache HTTP Server 2.4.34

The host is installed with Artifex Ghostscript before 9.25 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle an exception during incorrect "restoration of privilege" checking when running out of stack. Successful exploitation could allow attackers to supply crafted PostScript to execute code using the "pipe" instruction.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   8785

© SecPod Technologies