[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253928

 
 

909

 
 

198006

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26933 Download | Alert*

The host is installed with VMware Workstation 16.x before 16.2.0 and is prone to a heap-overflow vulnerability. A flaw is present in the application, which fails to handle an issue in the CD-ROM device emulation. Successful exploitation allows attackers with access to a virtual machine with CD-ROM device emulation to exploit this vulnerability in conjunction with other issues to execute code on th ...

The host is installed with Wireshark 3.4.0 before 3.4.11 or 3.6.0 before 3.6.1 and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle the Sysdig Event dissector crash issue. Successful exploitation could allow attackers to make Wireshark crash by injecting a malformed packet onto the wire or by convincing someone to read a malformed ...

The host is installed with Wireshark 3.4.0 before 3.4.11 or 3.6.0 before 3.6.1 and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle the RFC 7468 file parser infinite loop issue. Successful exploitation could allow attackers to make Wireshark consume excessive CPU resources by convincing someone to read a malformed packet trace file ...

The host is installed with Wireshark 3.6.0 before 3.6.1 and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle the pcapng file parser crash issue. Successful exploitation could allow attackers to make Wireshark crash by convincing someone to read a malformed packet trace file.

The host is installed with Wireshark 3.4.0 before 3.4.11 or 3.6.0 before 3.6.1 and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle the BitTorrent DHT dissector crash issue. Successful exploitation could allow attackers to make Wireshark crash by injecting a malformed packet onto the wire or by convincing someone to read a malforme ...

The host is installed with Wireshark 3.4.0 before 3.4.11 and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle the Gryphon dissector crash issue. Successful exploitation could allow attackers to make Wireshark crash by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.

The host is installed with Wireshark 3.4.0 before 3.4.11 or 3.6.0 before 3.6.1 and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle the RTMPT dissector crash issue. Successful exploitation could allow attackers to make Wireshark consume excessive CPU resources by injecting a malformed packet onto the wire or by convincing someone t ...

The host is installed with Apache CouchDB before 3.1.2 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to validate HTML attachment in the database content. Successful exploitation could allow attakers to add or remove data in any database or make configuration changes.

The host is installed with LibreOffice 7.0.x before 7.0.6 or 7.1.x before 7.1.2 and is prone to an improper certificate validation vulnerability. A flaw is present in the application, which fails to properly handle digital signatures of ODF documents. Successful exploitation allows attackers to modify a digitally signed ODF document to insert an additional signing time timestamp which LibreOffice ...

The host is installed with LibreOffice 7.0.x before 7.0.6 or 7.1.x before 7.1.2 and is prone to an improper certificate validation vulnerability. A flaw is present in the application, which fails to properly handle digital signatures of ODF documents. Successful exploitation allows attackers to create a digitally signed ODF document, by manipulating the documentsignatures.xml or macrosignatures.xm ...


Pages:      Start    1354    1355    1356    1357    1358    1359    1360    1361    1362    1363    1364    1365    1366    1367    ..   2693

© SecPod Technologies