[Forgot Password]
Login  Register Subscribe

25354

 
 

132812

 
 

149986

 
 

909

 
 

119359

 
 

158

 
 
Paid content will be excluded from the download.

Filter
Matches : 119361 Download | Alert*

The host is installed with Python 2.5.2 and earlier and is prone to integer overflow vulnerability. The flaw is present in the application, which fails to properly handle vectors related to "partial hashlib hashing of data exceeding 4GB. Successful exploitation allow context-dependent attackers to defeat cryptographic digests.

The host is installed with Python 2.5.2 and earlier and is prone to multiple integer overflows vulnerabilities. The flaws are present in the application, which fails to properly handle vectors related to the (1) stringobject, (2) unicodeobject, (3) bufferobject, (4) longobject, (5) tupleobject, (6) stropmodule, (7) gcmodule, and (8) mmapmodule modules. Successful exploitation allow context-depende ...

The host is installed with Python 2.5.2 and earlier and is prone to integer signedness error vulnerability. The flaw is present in the zlib extension module, which triggers insufficient memory allocation and a buffer overflow. Successful exploitation allows remote attackers to execute arbitrary code via a negative signed integer.

Python 64 bit is installed

The host is installed with Python and is prone to information disclosure vulnerability. A flaw is present in the application which is caused when specially crafted HTTP 302 redirect to cause the connected application to load a 'file://' resource to access a file or consume excessive resource. Successful exploitation allows remote attacker to cause denial-of-service condition.

Multiple race conditions in smtpd.py in the smtpd module in Python 2.6, 2.7 or 3.1allow remote attackers to cause a denial of service (daemon outage) by establishing and then immediately closing a TCP connection, leading to the accept function having an unexpected return value of None, an unexpected value of None for the address, or an ECONNABORTED, EAGAIN, or EWOULDBLOCK error, or the getpeername ...

The asyncore module in Python 2.x before 2.7.0 or 3.x before 3.2 does not properly handle unsuccessful calls to the accept function, and does not have accompanying documentation describing how daemon applications should handle unsuccessful calls to the accept function, which makes it easier for remote attackers to conduct denial of service attacks that terminate these applications via network conn ...

Python 32 bit is installed

The host is missing a critical security update according to Microsoft security bulletin, MS12-027. The update is required to fix a remote code execution vulnerability. A flaw is present in Windows common controls, which fails to handle a website containing specially crafted content. Successful exploitation could allow an attacker to gain the same user rights as the logged-on user.

The host is installed with Microsoft BizTalk Server 2002 or Microsoft Commerce Server 2002 or 2007 or 2009 or 2009 R2 or Microsoft Office 2003 or 2007 or 2010 or Microsoft Visual FoxPro or Visual Basic 6.0 Runtime and is prone remote code execution vulnerability. A flaw is present in the application, which fails to handle a specially crafted webpage. Successful exploitation could allow remote atta ...


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   11936

© SecPod Technologies