[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249982

 
 

909

 
 

195748

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 195010 Download | Alert*

lighttpd, a small webserver, is vulnerable to the POODLE attack via the use of SSLv3. This protocol is now disabled by default.

The host is installed with Microsoft Windows Server 2008 R2, R2 SP1, Windows 7 Gold or SP1 on the x64 platform and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle system requests. Successful exploitation could allow attackers to gain privileges.

The host is installed with Quicktime before 7.7.2 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted movie file with RLE encoding. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Quicktime before 7.7.2 and is prone to an Integer overflow vulnerability. A flaw is present in the application, which fails to properly handle sean atoms. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Quicktime before 7.7.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted .pict file. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple Mac OS X 10.7.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly restrict what is written to the system log for network logins. Successful exploitation could allow attackers to obtain sensitive information by reading the log.

The rsyslog packages provide an enhanced, multi-threaded syslog daemon. It supports MySQL, syslog/TCP, RFC 3195, permitted sender lists, filtering on any message part, and fine-grained control over output format. Security Fix: * rsyslog: Heap-based overflow in TCP syslog server For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related inform ...

The host is installed with Apple Mac OS X 10.6.8 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted RPC call. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a memory corruption issue. Successful exploitation allows an attacker to execute arbitrary code with kernel privileges.

The host is installed with Apple Mac OS X 10.13.6, 10.14.6 or 10.15.x before 10.15.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a memory corruption issue. Successful exploitation allows an attacker to execute arbitrary code with kernel privileges.


Pages:      Start    7556    7557    7558    7559    7560    7561    7562    7563    7564    7565    7566    7567    7568    7569    ..   19500

© SecPod Technologies