[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 9256 Download | Alert*

Fabian Baeumer, Marcus Brinkmann and Joerg Schwenk discovered that the SSH protocol is prone to a prefix truncation attack, known as the Terrapin attack. This attack allows a MITM attacker to effect a limited break of the integrity of the early encrypted SSH transport protocol by sending extra messages prior to the commencement of encryption, and deleting an equal number of consecutive messages im ...

The host is missing a security update according to Apple advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle multiple issues in various components. Successful exploitation allow attackers to execute arbitrary, cause denial of service, or disclose sensitive information.

The host is installed with Apple Mac OS 14 before 14.4 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle issues in unspecified vectors. On successful exploitation, multiple issues in openssh.

The host is missing a patch containing security fixes, which affects the following package(s):openssh.base.server and openssh.base.client

filezilla: Full-featured graphical FTP/FTPS/SFTP client FileZilla could be made to expose sensitive information over the network.

paramiko: Python SSH2 library A protocol flaw was fixed in Paramiko.

The host is installed with Oracle Database Server 19c, or 21c and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle handle vectors related to Oracle SQLcl and Grid Infrastructure (Apache Mina SSHD). Successful exploitation allows attackers to affect integrity.

The host is installed with Oracle Database Server 19c, or 21c and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle handle vectors related to Oracle Database Sharding. Successful exploitation allows attackers to affect availability.

The host is installed with Oracle Database Server 19c, or 21c and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle handle vectors related to Oracle Database Sharding. Successful exploitation allows attackers to affect availability.

The host is installed with Python through 3.11.4, or Oracle Database Server 21c and is prone to a buffer overflow vulnerability. The flaw is present in the application, which fails to properly handle the legacy email.utils.parseaddr function. Successful exploitation allows attackers to trigger "RecursionError: maximum recursion depth exceeded while calling a Python object" via a crafted argument.


Pages:      Start    804    805    806    807    808    809    810    811    812    813    814    815    816    817    ..   925

© SecPod Technologies