[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 195419 Download | Alert*

gnupg: GNU privacy guard - a free PGP replacement - gnupg2: GNU privacy guard - a free PGP replacement Several security issues were fixed in GnuPG.

thunderbird: Mozilla Open Source mail and newsgroup client Several security issues were fixed in Thunderbird.

firefox: Mozilla Open Source web browser Firefox could be made to crash or run programs as your login if it opened a malicious website.

openldap: OpenLDAP utilities OpenLDAP could be made to crash if it received specially crafted network traffic.

The host is installed with Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 and is prone to multiple integer overflow vulnerabilities. The flaws are present in the application, which fails to handle vectors related to the BACapp and Bluetooth HCI dissectors. Successful exploitation allows remote attackers to cause a denial of service.

The host is installed with Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle vectors related to the ANSI MAP, ASF, IEEE 802.11, IEEE 802.3 and LTP dissectors. Successful exploitation allows remote attackers to cause a denial of service (infinite loop).

The host is installed with Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 and is prone to multiple integer overflow vulnerabilities. The flaws are present in the application, which fails to handle vectors related to the BACapp and Bluetooth HCI dissectors. Successful exploitation allows remote attackers to cause a denial of service.

The host is installed with Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle vectors related to the ANSI MAP, ASF, IEEE 802.11, IEEE 802.3 and LTP dissectors. Successful exploitation allows remote attackers to cause a denial of service (infinite loop).

The host is installed with PHP before 5.3.15 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to handle the SQLite functionality. Successful exploitation allows attackers to bypass the open_basedir protection mechanism via unspecified vectors.

The host is installed with PHP before 5.3.15 or 5.4.0 before 5.4.5 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle the _php_stream_scandir function in the stream implementation. Successful exploitation has unknown impact and remote attack vectors, related to an "overflow."


Pages:      Start    7675    7676    7677    7678    7679    7680    7681    7682    7683    7684    7685    7686    7687    7688    ..   19541

© SecPod Technologies