[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14865 Download | Alert*

The host is installed with Python 3.3.x before 3.3.3 and is prone to denial of service vulnerability. The flaw is present in the application, which fails to properly handle a file size value larger than the size of the zip file to the (1) ZipExtFile.read, (2) ZipExtFile.read(n), (3) ZipExtFile.readlines, (4) ZipFile.extract, or (5) ZipFile.extractall function. Successful exploitation allows remote ...

The host is installed with Firebird before 2.1.7 or 2.5.x before 2.5.3 SU1 and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle an op_response action with a non-empty status. Successful exploitation could allow remote authenticated users to cause a denial of service.

The host is installed with Pidgin before 2.10.10 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a crafted certificate. Successful exploitation allows attackers to spoof servers and obtain sensitive information.

The host is installed with Pidgin before 2.10.10 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a large length value in an emoticon response. Successful exploitation allows attackers to cause a denial of service (application crash).

The host is installed with Pidgin before 2.10.10 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted server message. Successful exploitation allows attackers to cause a denial of service (application crash).

The host is installed with Pidgin before 2.10.10 and is prone to an absolute path traversal vulnerability. A flaw is present in the application, which fails to properly handle a drive name in a tar archive of a smiley theme. Successful exploitation allows attackers to write to arbitrary files.

The host is installed with Pidgin before 2.10.10 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a crafted XMPP message. Successful exploitation allows attackers to obtain sensitive information from process memory.

The host is installed with Apache CouchDB through 1.5.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle differences issue in count parameter to /_uuids component. Successful exploitation allows remote attackers to cause a denial of service.

The host is installed with Wireshark 1.10.0 before 1.10.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow attackers to make Wireshark crash by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.

The host is installed with Wireshark 1.10.x before 1.10.1 and is prone to integer signedness error vulnerability. A flaw is present in the dissect_headers function in epan/dissectors/packet-btobex.c in the Bluetooth OBEX dissector in Wireshark, which fails to handle a crafted packet. Successful exploitation allows attackers to cause a denial of service(infinite loop).


Pages:      Start    1303    1304    1305    1306    1307    1308    1309    1310    1311    1312    1313    1314    1315    1316    ..   1486

© SecPod Technologies