[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14298 Download | Alert*

The host is installed with Python 2.6 through 3.4 and is prone to a man-in-the-middle attack vulnerability. A flaw is present in the application, which fails to properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate. Successful exploitation could allow attackers to spoof arbitrary SSL servers.

The host is installed with OpenSSL 1.0.1 before 1.0.1q or 1.0.2 before 1.0.2e, Oracle MySQL 5.6.x through 5.6.28 or 5.7.x through 5.7.10 and is prone to a null pointer dereference vulnerability. A flaw is present in the application, which fails to properly handle an RSA PSS ASN.1 signature that lacks a mask generation function parameter. Successful exploitation allows remote attackers to cause a d ...

The host is installed with OpenSSL 1.0.2 before 1.0.2e and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle an attack against use of a (1) Diffie-Hellman (DH) or (2) Diffie-Hellman Ephemeral (DHE) ciphersuite. Successful exploitation allows remote attackers to obtain sensitive private-key information.

The host is installed with Python 3.2 through 3.5 and is prone to a race condition vulnerability. A flaw is present in the application, which fails to properly handle crafted input. Successful exploitation could allow attackers to crash the service.

The host is installed with Python before 2.6.8, 2.7.x before 2.7.3, 3.2.x before 3.2.3 or 3.x through 3.1.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle crafted input to an application that maintains a hash table. Successful exploitation could allow attackers to crash the service.

The host is installed with Python before before 2.6.8, 2.7.x before 2.7.3, 3.2.x before 3.2.3 or 3.x through 3.1.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle crafted XML-RPC POST. Successful exploitation could allow attackers to crash the service.

The host is installed with OpenVPN 2.4.x before 2.4.9 and is prone to an illegal client float vulnerability. A flaw is present in the application, which fails to properly handle data channel v2 (P_DATA_V2) packet. Successful exploitation could allow attackers to drop victim's connection.

Mozilla Firefox before 60.0, Firefox, Thunderbird or ESR before 52.8 : Mozilla developers and community members Christoph Diehl, Randell Jesup, Tyson Smith, Alex Gaynor, Ronald Crane, Julian Hector, Kannan Vijayan, and Jason Kratzer reported memory safety bugs present in Firefox and Firefox ESR. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that som ...

Mozilla Firefox before 60.0, Firefox, Thunderbird or ESR before 52.8 : A use-after-free vulnerability can occur while adjusting layout during SVG animations with text paths. This results in a potentially exploitable crash.

Mozilla Firefox before 60.0, Firefox, Thunderbird or ESR before 52.8 : An integer overflow can occur in the Skia library due to 32-bit integer use in an array without integer overflow checks, resulting in possible out-of-bounds writes. This could lead to a potentially exploitable crash triggerable by web content.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1429

© SecPod Technologies