[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 197798 Download | Alert*

The host is installed with Google Chrome before 16.0.912.63 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle libxml2. Successful exploitation could allow attackers to crash the service.

The host is installed with Google Chrome before 16.0.912.63 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle libxml2. Successful exploitation could allow attackers to crash the service.

The host is installed with Google Chrome before 16.0.912.63 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle libxml2. Successful exploitation could allow attackers to crash the service.

Multiple vulnerabilities has been discovered and corrected in libxml/libxml2: Integer overflow in xpath.c in libxml2 2.6.x through 2.6.32 and 2.7.x through 2.7.8, and libxml 1.8.16 and earlier, allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via a crafted XML file that triggers a heap-based buffer overflow when adding a new namespace node, relat ...

Two heap-based buffer overflow flaws were discovered in libarchive. If a user were tricked into expanding a specially-crafted ISO 9660 CD-ROM image or tar archive with an application using libarchive, it could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application . The updated packages have been patched to correct these issue ...

Double free vulnerabilities in libxml2 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted XPath expression and via vectors related to XPath handling . Packages for 2009.0 are provided as of the Extended Maintenance Program

A vulnerability has been found and corrected in ruby: Ruby before 1.8.7-p357 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service via crafted input to an application that maintains a hash table. The updated packages have been patched to correct this issue.

A vulnerability has been found and corrected in libxml2: A heap-based buffer overflow in libxml2 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors . The updated packages have been patched to correct this issue.

A vulnerability was found and corrected in libxml2: A heap-buffer overflow was found in the way libxml2 decoded certain XML entites. A remote attacker could provide a specially-crafted XML file, which once opened in an application linked against libxml would cause that application to crash, or, potentially, execute arbitrary code with the privileges of the user running the application . The update ...

The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle invalid sCAL chunks. Successful exploitation could allow attackers to crash the service.


Pages:      Start    9547    9548    9549    9550    9551    9552    9553    9554    9555    9556    9557    9558    9559    9560    ..   19779

© SecPod Technologies