[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

254802

 
 

909

 
 

198617

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26800 Download | Alert*

The host is installed with LibreOffice 6.0.6.2 or 6.1.3.2 and is prone to a signature validation bypass vulnerability. A flaw is present in the application, which fails to properly handle issues in signature validation. Successful exploitation could allow attackers to use the incremental saving feature to add pages or annotations, which will display the body updates to the user without any action ...

The host is installed with VideoLAN VLC media player before 2.0.7 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle the web interface. Successful exploitation allows remote attackers to view directory listings via the 'dir' command or issue other commands without authenticating.

The host is installed with Opera Browser before 11.60 and is prone to address spoofing vulnerability. A flaw is present in the application, which fails to properly handle the unspecified homograph characters. Successful exploitation allows remote attackers to spoof the address bar via unspecified homograph characters.

The host is installed with Wireshark 3.4.0 to 3.4.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an issue in USB HID dissector. Successful exploitation allows attackers to crash Wireshark by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.

The host is installed with Wireshark 3.4.0 to 3.4.2 and is prone to a memory leak vulnerability. A flaw is present in the application, which fails to properly handle an issue in USB HID dissector. Successful exploitation allows attackers to leak memory and cause denial of service.

The host is installed with Wireshark 1.8.x before 1.8.2 and is prone to array index error vulnerability. A flaw is present in the application, which fails to properly handle certain integer fields. Successful exploitation allows remote attackers to cause a denial of service (application crash).

The host is installed with Wireshark 1.8.x before 1.8.2 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle certain integer fields. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Oracle VM VirtualBox before 6.1.18 and is prone to an privilege escalation vulnerability. A flaw is present in the application, which fails to handle vectors related to Core. Successful exploitation allows attackers to affect Integrity.

The host is installed with Oracle VM VirtualBox before 6.1.18 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle vectors related to Core. Successful exploitation allows attackers to affect Availability.

The host is installed with Oracle VM VirtualBox before 6.1.18 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle vectors related to Core. Successful exploitation allows attackers to affect Confidentiality and Integrity.


Pages:      Start    1336    1337    1338    1339    1340    1341    1342    1343    1344    1345    1346    1347    1348    1349    ..   2679

© SecPod Technologies