[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253390

 
 

909

 
 

197257

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26687 Download | Alert*

The host is installed with Brave Browser before 1.57.64 and is prone to a heap buffer overflow vulnerability. A flaw is present in the application, which fails to handle issues in libwebp. Successful exploitation allows attackers to cause unspecified impact.

The host is installed with Microsoft Visual Studio Code Python Extension before 2020.9.114305 and is prone to a remote code execution vulnerability. A flaw is present in the aplication which fails to handle unspecified vectors. Successfull exploitation allows an attacker to cause unspecified impact.

The host is installed with Python before 3.6.11, 3.7.x before 3.7.7, or 3.8.x before 3.8.2 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to properly handle an issue in heappushpop function in heapq. Successful exploitation allows attackers to cause use-after-free vulnerability.

The host is installed with Wireshark 4.0.0 before 4.0.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the issue in RTPS dissector. Successful exploitation allows attackers to crash Wireshark by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.by convincing someone to r ...

The host is installed with Apache HTTP Server 2.0.0 through 2.4.13.2 and is prone to a NULL pointer dereference vulnerability. A flaw is present in the application, which fails to properly handle issues in mod_auth_openidc is an authentication and authorization module. Successful exploitation could allows attackers to cause denial of service through a crafted cookies.

The host is installed with Wireshark 3.6.0 before 3.6.13 or Wireshark 4.0.0 before 4.0.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the issue in LISP dissector large loop. Successful exploitation could allow attackers to make Wireshark consume excessive CPU resources by injecting a malformed packet onto the wire or by con ...

The host is installed with Wireshark 3.6.0 before 3.6.13 or Wireshark 4.0.0 before 4.0.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the issue in RPCoRDMA dissector. Successful exploitation could allow attackers to make Wireshark consume excessive CPU resources by injecting a malformed packet onto the wire or by convincing ...

The host is installed with Wireshark 3.6.0 before 3.6.13 or Wireshark 4.0.0 before 4.0.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the issue in GQUIC dissector. Successful exploitation could allow attackers to make Wireshark consume excessive CPU resources by injecting a malformed packet onto the wire or by convincing so ...

The host is installed with Wireshark 4.0.0 before 4.0.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the issue in BLF file parser. Successful exploitation allows attackers to crash Wireshark by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.

The host is installed with Apache Struts 2.0.x before 2.5.33, or 6.0.x before 6.3.0.2 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly handle issue in the file upload params. Successful exploitation could allow attackers to manipulate file upload params to enable path traversal and under some circumstances this can lead to uploadi ...


Pages:      Start    1105    1106    1107    1108    1109    1110    1111    1112    1113    1114    1115    1116    1117    1118    ..   2668

© SecPod Technologies