[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26884 Download | Alert*

The host is installed with OpenSSL 1.0.1 before 1.0.1j and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted handshake message. Successful exploitation could allow attackers to crash the service.

The host is installed with OpenSSL 1.0.1 before 1.0.1j, 1.0.0 before 1.0.0o or 0.9.8 before 0.9.8zc and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a large number of invalid session tickets. Successful exploitation could allow attackers to crash the service.

The host is installed with OpenSSL 1.0.1 before 1.0.1j, 1.0.0 before 1.0.0o or 0.9.8 before 0.9.8zc and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a SSL handshake request. Successful exploitation could allow attackers to make servers to accept and complete a SSL 3.0 handshake, and clients could be configured to send them.

The host is installed with Oracle Java SE 5.0u71 and earlier, 6u81 or 7u67 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to Hotspot. Successful exploitation could allow attackers to affect confidentiality.

The host is installed with Apple QuickTime before 7.7.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted movie file. Successful exploitation allows attackers to execute arbitrary code or cause unexpected application termination.

The host is installed with Apple QuickTime before 7.7.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted movie file. Successful exploitation allows attackers to execute arbitrary code or cause unexpected application termination.

The host is installed with Apple QuickTime before 7.7.6 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted MIDI file. Successful exploitation allows attackers to execute arbitrary code or cause unexpected application termination.

The host is installed with Apple QuickTime before 7.7.6 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted m4a file. Successful exploitation allows attackers to execute arbitrary code or cause unexpected application termination.

The host is installed with Oracle MySQL 5.5.x through 5.5.38 or MySQL 5.6.x through 5.6.19 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to SERVER:MyISAM. Successful exploitation allows local users to affect confidentiality, integrity and availability.

The host is installed with Oracle MySQL 5.5.x through 5.5.38 or MySQL 5.6.x through 5.6.19 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to SERVER:CHARACTER SETS. Successful exploitation allows remote authenticated users to affect availability.


Pages:      Start    1295    1296    1297    1298    1299    1300    1301    1302    1303    1304    1305    1306    1307    1308    ..   2688

© SecPod Technologies