[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256610

 
 

909

 
 

199263

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15029 Download | Alert*

The host is installed with Oracle Java SE and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to Java Language and unspecified APIs. Successful exploitation allow remote attackers to affect availability.

The host is installed with Microsoft Windows and is prone to buffer overflow vulnerability. A flaw is present in BowserWriteErrorLogEntry function in Common Internet File System (CIFS) browser service in Mrxsmb.sys or bowser.sys, which fail to properly handle malicious browser election request packets containing an overly long server name string. Successful exploitation allow man-in-the-middle att ...

The host is installed with PHP and is prone to denial of service vulnerability on windows. The flaw is present in _zip_name_locate function in zip_name_locate.c in the Zip extension, which fails to handle a ZIPARCHIVE::FL_UNCHANGED argument

The host is installed with PHP and is prone to Denial of Service vulnerability. The falw is due to Buffer overflow in the strval function, when the precision configuration option has a large value. Successful exploitation could allow remote attackers to a denial of service via a small numerical value in the argument.

The host is installed with PHP and is prone to Denial of Service vulnerability. The flaw is due to Unspecified vulnerability in the NumberFormatter::setSymbol in the Intl extension in PHP. Successful exploitation could allow remote attackers to cause a denial of service via an invalid argument

The host is installed with PHP and is prone to Denial of Service vulnerability. The flaw is caused due to integer overflow in the SdnToJulian function in the Calendar extension in PHP. Successful exploitation could allow remote attackers to cause a denial of service via a large integer in the first argument to the cal_from_jd function.

The host is installed with PHP and is prone to denial of service vulnerability on windows. The flaw is due to memory leaks while using openssl_decrypt and openssl_encrypt functions. Successful exploitation could allow remote attackers to a denial of service

The host is installed with PHP and is prone to Denial of Service vulnerability. The falw is due to unspecified vulnerability in the Streams component. Successful exploitation could allow remote attackers to cause a denial of service by accessing an ftp:// URL during use of an HTTP proxy with the FTP wrapper.

The host is installed with PHP and is prone to Denial of Service vulnerability. The flaw is present in stream_get_contents function, which fails to handle ziparchive stream. Successful exploitation could allow remote attackers to cause a denial of service via a ziparchive stream.

The host is installed with PHP and is prone to Denial of Service vulnerability. The flaw is present in substr_replace() function, which makes the PHP to use the same pointer in three variables inside the function so when the pointer is changed by a type conversion inside the function, it invalids the other variables. Successful exploitation could allow remote attackers to cause a denial of service ...


Pages:      Start    1038    1039    1040    1041    1042    1043    1044    1045    1046    1047    1048    1049    1050    1051    ..   1502

© SecPod Technologies