[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26884 Download | Alert*

The host is installed with Google Chrome before 30.0.1599.66 and is prone to use-after-free vulnerability. A flaw is present in the application, which fails to handle the color-chooser dialog on windows. Successful exploitation allows attackers to cause a denial of service.

The host is installed with VideoLAN VLC media player before 2.0.8 and is prone to buffer overflow vulnerability. The flaw is present in the mp4a packetizer (modules/packetizer/mpeg4audio.c), which fails to perform adequate boundary checks on user-supplied input. Successful exploitation allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code.

The host is installed with OpenSSL 1.0.1 before 1.0.1f and is prone to denial of service vulnerability. The flaw is present in the ssl_get_algorithm2 function in ssl/s3_lib.c, which fails to handle crafted traffic. Successful exploitation allows attackers to cause a denial of service (daemon crash).

The host is installed with OpenSSL 1.0.0 before 1.0.0l or 1.0.1 before 1.0.1f and is prone to denial of service vulnerability. The flaw is present in the DTLS retransmission implementation, which fails to handle the data structures for digest and encryption contexts. Successful exploitation could allow attacker to trigger the use of a different context and cause a denial of service (application cr ...

The host is installed with OpenSSL 1.0.1 before 1.0.1f and is prone to denial of service vulnerability. The flaw is present in the ssl3_take_mac function in ssl/s3_both.c in OpenSSL, which fails to properly handle a crafted Next Protocol Negotiation record in a TLS handshake. Successful exploitation could allow remote TLS servers to cause a denial of service (NULL pointer dereference and applicati ...

The host is installed with VideoLAN VLC Media Player before 2.1.3 and is prone to divide-by-zero error vulnerability. A flaw is present in the application, which fails to handle a zero minimum and maximum data packet size in an ASF file. Successful exploitation allows attackers to cause a denial of service.

The host is installed with Wireshark 1.10.0 before 1.10.6 or 1.8.0 before 1.8.13 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow attackers to make Wireshark crash by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet ...

The host is installed with OpenSSL 1.0.1 before 1.0.1g and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle Heartbeart Extension packets. Successful exploitation could allow attackers to disclose sensitive information.

The host is installed with Wireshark 1.10.12 through 1.10.14 and is prone to a denial of service vulnerability. A flaw is present in the application, which mishandles a certain strdup return value. Successful exploitation could allow attackers to cause a denial of service (application crash).

The exception::getTraceAsString function in Zend/zend_exceptions.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to execute arbitrary code via an unexpected data type, related to a "type confusion" issue.


Pages:      Start    1650    1651    1652    1653    1654    1655    1656    1657    1658    1659    1660    1661    1662    1663    ..   2688

© SecPod Technologies