[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

114563

 
 

909

 
 

88860

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 6162 Download | Alert*

Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their offic ...

libssh versions 0.6 and above have an authentication bypass vulnerability in the server code. By presenting the server an SSH2_MSG_USERAUTH_SUCCESS message in place of the SSH2_MSG_USERAUTH_REQUEST message which the server would expect to initiate authentication, the attacker could successfully authenticate without any credentials.

The host is installed with Adobe Flash Player before 31.0.0.108 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to disclose sensitive information.

The host is installed with Adobe Flash Player before 31.0.0.108 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to disclose sensitive information.

tcpdump 4.9.2 has a heap-based buffer over-read related to aoe_print in print-aoe.c and lookup_emem in addrtoname.c.

The host installed with kernel package on RHEL 7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle clearing of SELinux attributes. Successful exploitation could allow attackers to empty (null) write to /proc/pid/attr file that can crash the system by causing the system to attempt to access unmapped kernel memory.

The host is installed with 9.7 before FP6 or 9.8 before FP5 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted request. Successful exploitation allows remote attackers to cause NULL pointer dereference, and resource consumption or daemon crash.

The host is installed with IBM DB2 9.7 before FP6 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle the XML files. Successful exploitation allows remote authenticated users to read arbitrary XML files via unknown vectors.

The host is installed with Google Chrome before 1.0.154.65 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a document with a SVGPathList data structure containing a negative index in the SVGTransformList, SVGStringList, SVGNumberList, SVGPathSegList, SVGPointList or SVGLengthList SVGList object, which triggers memory corruption ...

The host is installed with Google Chrome before 1.0.154.65 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a document with a SVGPathList data structure containing a negative index in the SVGTransformList, SVGStringList, SVGNumberList, SVGPathSegList, SVGPointList or SVGLengthList SVGList object, which triggers memory corruption ...


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   616

© SecPod Technologies