[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26443 Download | Alert*

The host is installed with Apache Tomcat 5.5.0 through 5.5.27 or 6.0.0 through 6.0.18 and is prone to unspecified vulnerability. A flaw is present in the application, which fails handle a crafted application. Successful exploitation allows remote attackers to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded ear ...

The host is installed with Apache Tomcat 5.5.0 through 5.5.29 or 6.0.0 through 6.0.26 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails handle a directory traversal sequences in a WAR filename, as demonstrated by the ...war filename. Successful exploitation allows remote attackers to discover the server's hostname or IP address by sending a req ...

The host is installed with OpenSSL before 0.9.8m and is prone to unspecified vulnerability. A flaw is present in the application, which does not check for a NULL return value from bn_wexpand function calls in (1) crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3) crypto/ec/ec2_smpl.c, and (4) engines/e_ubsec.c. Successful exploitation could allow remote attackers to cause a denial of service.

The host is installed with OpenSSL and is prone to remote code execution vulnerability. A flaw is present in ssl3_get_key_exchange function, which fails to correctly implement ECDH algorithm. Successful exploitation allow remote attackers to execute arbitrary code and cause denial of service via a crafted private key with an invalid prime.

The host is installed with vlc media player 0.9.0 through 1.1.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted media file. Successful exploitation could allow attackers to crash the service.

The host is installed with VLC Media Player 1.1.3 or below and is prone to an untrusted search path vulnerability in bin/winvlc.c. A flaw is present in the application, which fails to validate user supplied input. Successful exploitation allows attacker to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse wintab32.dll that is located in the same folder as a .mp3 file.

Stack-based buffer overflow in the UpdateFrameTitleForDocument method in the CFrameWnd class in mfc42.dll in the Microsoft Foundation Class (MFC) Library in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 allows context-dependent attackers to execute arbitrary code via a long window title that this library a ...

WebM libvpx (aka the VP8 Codec SDK) before 0.9.5, as used in Google Chrome before 7.0.517.44, allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via invalid frames.

The host is installed with OpenSSH version 5.6 or lower and is prone to security bypass vulnerability. A flaw is present in J-PAKE protocol which fails to validate the knowledge of shared secret. Successful exploitation could allow an attacker to authenticate without proper credentials by sending malformed requests.

The host is installed with vlc media player before 1.1.6 and is prone to multiple integer overflow vulnerabilities. The flaws are present in the application, which fails to properly handle a zero i_subpackets value in a Real Media file. Successful exploitation could allow attackers to execute arbitrary code or crash the service.


Pages:      Start    1575    1576    1577    1578    1579    1580    1581    1582    1583    1584    1585    1586    1587    1588    ..   2644

© SecPod Technologies