[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256488

 
 

909

 
 

199193

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15029 Download | Alert*

The host is installed with Google Chrome before 31.0.1650.63 and is prone to out-of-bounds write vulnerability. The flaws are present in the application, which fails to handle the DehoistArrayIndex function. Successful exploitation allows the remote attacker to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact.

The host is installed with Google Chrome before 31.0.1650.63 and is prone to out-of-bounds read vulnerability. The flaws are present in the application, which fails to handle the DehoistArrayIndex function. Successful exploitation allows the remote attacker to cause a denial of service (out-of-bounds read).

The host is installed with Google Chrome before 33.0.1750.146 and is prone to multiple unspecified vulnerabilities. The flaws are present in the application, which fails to handle certain vectors related to V8 engine. Successful exploitation allows attackers to cause a denial of service or possibly have other impact via unknown vectors.

The host is installed with Python 2.5.2 and earlier and is prone to integer signedness error vulnerability. The flaw is present in the zlib extension module, which triggers insufficient memory allocation and a buffer overflow. Successful exploitation allows remote attackers to execute arbitrary code via a negative signed integer.

The host is installed with Python 2.5.2 and earlier and is prone to multiple integer overflows vulnerabilities. The flaws are present in the application, which fails to properly handle vectors related to the (1) stringobject, (2) unicodeobject, (3) bufferobject, (4) longobject, (5) tupleobject, (6) stropmodule, (7) gcmodule, and (8) mmapmodule modules. Successful exploitation allow context-depende ...

The host is installed with Python 2.5.2 and earlier and is prone to integer overflow vulnerability. The flaw is present in the application, which fails to properly handle vectors related to "partial hashlib hashing of data exceeding 4GB. Successful exploitation allow context-dependent attackers to defeat cryptographic digests.

The host is installed with Python 2.5.2 and earlier and is prone to multiple buffer overflow vulnerabilities. The flaws are present in the application, which fails to properly handle long string that leads to incorrect memory allocation during Unicode string processing, related to the unicode_resize function and the PyMem_RESIZE macro. Successful exploitation allow context-dependent attackers to c ...

The host is installed with Python before 2.5.2 and is prone to multiple integer overflow vulnerabilities. The flaws are present in the application, which fails to properly handle vectors related to (1) Include/pymem.h; (2) _csv.c, (3) _struct.c, (4) arraymodule.c, (5) audioop.c, (6) binascii.c, (7) cPickle.c, (8) cStringIO.c, (9) cjkcodecs/multibytecodec.c, (10) datetimemodule.c, (11) md5.c, (12) ...

The host is installed with Python 2.5.2 and earlier and is prone to buffer overflow vulnerability. The flaw is present in the PyOS_vsnprintf function in Python/mysnprintf.c, which fails to properly handle crafted input to string formatting operations. Successful exploitation allow context-dependent attackers to cause a denial of service (memory corruption) or have unspecified other impact.

The host is installed with Python 2.6 before 2.7.4 or 3.x through 3.2 and is prone to information disclosure vulnerability. The flaw is present in the application, which creates ~/.pypirc with world-readable permissions before changing them after data has been written. Successful exploitation introduces a race condition that allows local users to obtain a username and password by reading this file ...


Pages:      Start    27    28    29    30    31    32    33    34    35    36    37    38    39    40    ..   1502

© SecPod Technologies