[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 197798 Download | Alert*

parser.c in libxml2 before 2.9.5 mishandles parameter-entity references because the NEXTL macro calls the xmlParserHandlePEReference function in the case of a '%' character in a DTD name. GNOME project libxml2 v2.9.10 has a global buffer over-read vulnerability in xmlEncodeEntitiesInternal at libxml2/entities.c. The issue has been fixed in commit 50f06b3e. There's a flaw in libxml2's xmllint. An a ...

The host is installed with Apple Mac OS 11 before 11.7.2 or Apple Mac OS 12 before 12.6.2 or Apple Mac OS 13 before 13.0.1 and is prone to an integer overflow vulnerability. A flaw is present in the application which fails to properly validate input. Successful exploitation allows a remote user to cause unexpected app termination or arbitrary code execution.

The host is installed with Apple Mac OS 13 before 13.0.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle issues in checks. On successful exploitation, a remote user may be able to cause unexpected app termination or arbitrary code execution.

The host is installed with Apple Mac OS 13 before 13.0.1 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to properly handle issues in input validation. On successful exploitation, a remote user may be able to cause unexpected app termination or arbitrary code execution.

The host is installed with Apache HTTP Server through 2.4.57 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle mod_macro of Apache HTTP Server. Successful exploitation allows attackers to cause unspecified impact.

The host is installed with Apache HTTP Server 2.4.55 through 2.4.57 and is prone to an uncontrolled resource consumption vulnerability. A flaw is present in the application, which fails to properly handle a HTTP/2 connection with an initial window size of 0. Successful exploitation could allows attackers to exhaust worker resources in the server, similar to the well known "slow loris" attack patte ...

The host is installed with Apache HTTP Server 2.2.x before 2.2.24-dev or 2.4.x before 2.4.4 and is prone to multiple cross-site scripting (XSS) vulnerabilities. The flaws are present in the application, which fails to properly handle a crafted string. Successful exploitation allows remote attackers to inject arbitrary web script or HTML.

The host is installed with Apache HTTP Server 2.2.x before 2.2.24-dev or 2.4.x before 2.4.4 and is prone to multiple cross-site scripting (XSS) vulnerabilities. The flaws are present in the application, which fails to handle vectors involving hostnames and URIs in the mod_imagemap, mod_info, mod_ldap, mod_proxy_ftp and mod_status modules. Successful exploitation allows remote attackers to inject a ...

The host is installed with Apache HTTP Server 2.4.0 through 2.4.52 and is prone to an out-of-bounds write of data authenticity vulnerability. A flaw is present in the application, which fails to properly handle issues in mod_sed. Successful exploitation could allow an attacker to overwrite heap memory with possibly attacker provided data.

The host is installed with Apache HTTP Server 2.4.0 through 2.4.53 and is prone to an inconsistent interpretation of HTTP requests vulnerability. A flaw is present in the application, which fails to properly handle issues in mod_proxy_ajp. Successful exploitation could allow attackers to smuggle requests to the AJP server it forwards requests to.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   19779

© SecPod Technologies