[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 195419 Download | Alert*

The host is installed with Apple Mac OS X or Server before 10.10 and is prone to a security bypass vulnerability. A flaw is present in the application, which does not ensure that a Kerberos ticket is in the cache for the correct user. Successful exploitation allows attackers to gain privileges in opportunistic circumstances.

The host is installed with Apache Subversion 1.0.0 through 1.7.x before 1.7.17 or 1.8.x before 1.8.10 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a crafted authentication realm. Successful exploitation makes it easier for remote servers to obtain the credentials.

The host is installed with glibc before 2.20 and is prone to an use-after-free vulnerabilities. The flaws are present in the application, which does not copy its path argument in accordance with the POSIX specification. Successful exploitation allows context-dependent attackers to trigger use-after-free vulnerabilities.

The host is installed with GnuPG 1.x before 1.4.17 and 2.x before 2.0.24 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle malformed compressed packets, as demonstrated by an a3 01 5b ff byte sequence. Successful exploitation allows context-dependent attackers to cause a denial of service.

The host is installed with Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3 or SeaMonkey before 2.31 and is prone to multiple unspecified vulnerabilities. The flaws are present in the applications, which fail to handle unknown vectors. Successful exploitation allows attackers to cause a denial of service (memory corruption and application crash) or possibly execut ...

The host is installed with Mozilla Firefox before 34.0 or SeaMonkey before 2.31 and is prone to multiple unspecified vulnerabilities. The flaws are present in the applications, which fail to handle unknown vectors. Successful exploitation allows attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code.

The host is missing a security update according to MFSA 2014-83. The update is required to fix multiple unspecified vulnerabilities. The flaws are present in the applications, which fail to handle unknown vectors. Successful exploitation allows attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code.

The host is installed with Mozilla Firefox before 34.0 or SeaMonkey before 2.31 and is prone to a security bypass vulnerability. A flaw is present in the applications, which fail to handle an XBL binding. Successful exploitation allows attackers to bypass intended access restrictions.

The host is missing a security update according to MFSA 2014-84. The update is required to fix a security bypass vulnerability. A flaw is present in the applications, which fail to handle an XBL binding. Successful exploitation allows attackers to bypass intended access restrictions.

The host is installed with Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3 or SeaMonkey before 2.31 and is prone to a denial of service vulnerability. A flaw is present in the applications, which fail to handle a crafted JavaScript object. Successful exploitation allows attackers to cause a denial of service (application crash).


Pages:      Start    7552    7553    7554    7555    7556    7557    7558    7559    7560    7561    7562    7563    7564    7565    ..   19541

© SecPod Technologies