The host is installed with Python 3.3.x before 3.3.3 and is prone to denial of service vulnerability. The flaw is present in the application, which fails to properly handle a file size value larger than the size of the zip file to the (1) ZipExtFile.read, (2) ZipExtFile.read(n), (3) ZipExtFile.readlines, (4) ZipFile.extract, or (5) ZipFile.extractall function. Successful exploitation allows remote ...
The host is installed with Firebird before 2.1.7 or 2.5.x before 2.5.3 SU1 and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle an op_response action with a non-empty status. Successful exploitation could allow remote authenticated users to cause a denial of service.
The host is installed with Pidgin before 2.10.10 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a crafted certificate. Successful exploitation allows attackers to spoof servers and obtain sensitive information.
The host is installed with Pidgin before 2.10.10 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a large length value in an emoticon response. Successful exploitation allows attackers to cause a denial of service (application crash).
The host is installed with Pidgin before 2.10.10 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted server message. Successful exploitation allows attackers to cause a denial of service (application crash).
The host is installed with Pidgin before 2.10.10 and is prone to an absolute path traversal vulnerability. A flaw is present in the application, which fails to properly handle a drive name in a tar archive of a smiley theme. Successful exploitation allows attackers to write to arbitrary files.
The host is installed with Pidgin before 2.10.10 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a crafted XMPP message. Successful exploitation allows attackers to obtain sensitive information from process memory.
The host is installed with Apache CouchDB through 1.5.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle differences issue in count parameter to /_uuids component. Successful exploitation allows remote attackers to cause a denial of service.
The host is installed with Wireshark 1.10.0 before 1.10.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow attackers to make Wireshark crash by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.
The host is installed with Wireshark 1.10.x before 1.10.1 and is prone to integer signedness error vulnerability. A flaw is present in the dissect_headers function in epan/dissectors/packet-btobex.c in the Bluetooth OBEX dissector in Wireshark, which fails to handle a crafted packet. Successful exploitation allows attackers to cause a denial of service(infinite loop).