[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256040

 
 

909

 
 

199103

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 198218 Download | Alert*

The host is missing a high severity security update according to Google advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle certain vectors related to memory. Successful exploitation allows attackers to cause a denial of service.

The host is installed with Google Chrome before 7.0.517.44 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle invalid frames. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Google Chrome before 7.0.517.44 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle invalid frames. Successful exploitation allows attackers to execute arbitrary code.

Christoph Diehl discovered that libvpx did not properly perform bounds checking. If an application using libvpx opened a specially crafted WebM file, an attacker could cause a denial of service or possibly execute code as the user invoking the program.

A vulnerability has been found in Apache mod_fcgid. The Common Vulnerabilities and Exposures project identifies the following problem: CVE-2010-3872 A stack overflow could allow an untrusted FCGI application to cause a server crash or possibly to execute arbitrary code as the user running the web server.

A possible stack overflow in apache2-mod_fcgid due to wrong pointer arithmetic has been fixed. CVE-2010-3872 has been assigned to this issue.

linux: Linux kernel Multiple kernel flaws have been fixed.

The host is installed with OpenSSH version 5.6 or lower and is prone to security bypass vulnerability. A flaw is present in J-PAKE protocol which fails to validate the knowledge of shared secret. Successful exploitation could allow an attacker to authenticate without proper credentials by sending malformed requests.

A vulnerability has been discovered and corrected in clamav: Off-by-one error in the cli_hm_scan function in matcher-hash.c in libclamav in ClamAV before 0.97.2 allows remote attackers to cause a denial of service via an e-mail message that is not properly handled during certain hash calculations . Packages for 2009.0 are provided as of the Extended Maintenance Program

Clam AntiVirus is an anti-virus toolkit for UNIX. The main purpose of this software is the integration with mail servers . The package provides a flexible and scalable multi-threaded daemon, a command line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use with your own software. The vir ...


Pages:      Start    10817    10818    10819    10820    10821    10822    10823    10824    10825    10826    10827    10828    10829    10830    ..   19821

© SecPod Technologies