[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

251782

 
 

909

 
 

196543

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 17304 Download | Alert*

The host is installed with Wireshark 2.6.0 to 2.6.14, 3.0.0 to 3.0.8 or 3.2.0 to 3.2.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an issue in plugins/epan/wimax/msg_dlmap.c file. Successful exploitation allows attackers to crash the WiMax DLMAP dissector could crash.

The host is installed with Wireshark 3.2.0 to 3.2.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an issue in epan/dissectors/packet-wireguard.c file. Successful exploitation allows attackers to crash the WireGuard dissector could crash.

The host is installed with Wireshark 2.6.0 to 2.6.14, 3.0.0 to 3.0.8 or 3.2.0 to 3.2.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an issue in epan/dissectors/packet-eap.c file. Successful exploitation allows attackers to crash the EAP dissector could crash.

The host is installed with Opera before 11.65 and is prone to spoofing attacks. A flaw is present in the application, which fails to ensure that the address field corresponds to the displayed web page during blocked navigation. Successful exploitation allows remote attackers to conduct spoofing attacks by detecting and preventing attempts to load a different web page.

The host is installed with Opera before 11.64 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly allocate memory for URL strings. Successful exploitation allows remote attackers to cause memory corruption or application crash.

The host is installed with Opera before 12.00 beta and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted web page that is not properly handled during a reload. Successful exploitation allows remote attackers to cause application crash.

The host is installed with FileZilla 3.x before 3.41.0 and is prone to an untrusted search path vulnerability. A flaw is present in the application, which fails to properly handle a malicious fzsftp binary. Successful exploitation might allow an attacker to gain privileges.

The host is installed with Opera before 12.00 beta and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a web page that contains invalid character encodings. Successful exploitation allows remote attackers to cause application crash.

The host is installed with Opera before 12.00 beta and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle an absolutely positioned wrap=off TEXTAREA element located next to an "overflow: auto" block element. Successful exploitation allows remote attackers to cause application hang.

The host is installed with Opera before 12.00 beta and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted characters in domain names. Successful exploitation allows remote attackers to cause application crash.


Pages:      Start    788    789    790    791    792    793    794    795    796    797    798    799    800    801    ..   1730

© SecPod Technologies