[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

114411

 
 

909

 
 

88812

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 88593 Download | Alert*

nbd: Network Block Device protocol An attacker could send crafted input to NBD and cause it to crash or to run arbitrary programs.

puppet: Centralized configuration management Puppet would allow unintended access to resources over the network.

Tor is a connection-based low-latency anonymous communication system. Applications connect to the local Tor proxy using the SOCKS protocol. The local proxy chooses a path through a set of relays, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is unwrapped by a symmetric key at each relay, which reveals the downstream relay. Warnings: Tor do ...

Tor is a connection-based low-latency anonymous communication system. Applications connect to the local Tor proxy using the SOCKS protocol. The local proxy chooses a path through a set of relays, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is unwrapped by a symmetric key at each relay, which reveals the downstream relay. Warnings: Tor do ...

Witold Baryluk discovered that MaraDNS, a simple security-focused Domain Name Service server, may overflow an internal buffer when handling requests with a large number of labels, causing a server crash and the consequent denial of service.

The host is installed with Google Picasa and is prone to untrusted search path vulnerability. A flaw is present in the application, which fails to securely load executables while using the Locate on Disk feature. Successful exploitation could allow remote attackers to execute arbitrary code with the privilege of the running application.

The host is installed with Apple Mac OS X 10.6.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle an invalid size argument, which triggers a NULL pointer dereference. Successful exploitation could allow attackers to crash the service.

Tor is a connection-based low-latency anonymous communication system. Applications connect to the local Tor proxy using the SOCKS protocol. The local proxy chooses a path through a set of relays, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is unwrapped by a symmetric key at each relay, which reveals the downstream relay. Warnings: Tor do ...

Ansgar Burchardt discovered several vulnerabilities in DTC, a web control panel for admin and accounting hosting services. CVE-2011-0434 The bw_per_moth.php graph contains an SQL injection vulnerability. CVE-2011-0435 Insufficient checks in bw_per_month.php can lead to bandwidth usage information disclosure. CVE-2011-0436 After a registration, passwords are sent in cleartext email messages. CVE-20 ...

The developers of Tor, an anonymizing overlay network for TCP, found three security issues during a security audit. A heap overflow allowed the execution of arbitrary code , a denial of service vulnerability was found in the zlib compression handling and some key memory was incorrectly zeroed out before being freed. The latter two issues do not yet have CVE identifiers assigned


Pages:      Start    7850    7851    7852    7853    7854    7855    7856    7857    7858    7859    7860    7861    7862    7863    ..   8859

© SecPod Technologies