[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253928

 
 

909

 
 

198006

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 197121 Download | Alert*

The host is installed with Oracle VM VirtualBox before 6.1.18 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle vectors related to Core. Successful exploitation allows unauthorized attackers to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox.

The host is installed with Oracle VM VirtualBox before 6.1.18 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle vectors related to Core. Successful exploitation allows unauthorized attackers to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox.

The host is installed with VideoLAN VLC media player 3.0.11 and is prone to a out-of-bounds write vulnerability. A flaw is present in the application, which fails to properly handle an issue in EbmlTypeDispatcher::send. Successful exploitation could allow attackers to trigger a heap-based buffer overflow via a crafted .mkv file.

The host is installed with VideoLAN VLC media player through 3.0.11 and is prone to a out-of-bounds write vulnerability. A flaw is present in the application, which fails to properly handle an issue in EbmlTypeDispatcher::send. Successful exploitation could allow attackers to trigger a heap-based buffer overflow via a crafted .mkv file.

Multiple vulnerabilities were discovered in the VLC media player, which could result in the execution of arbitrary code or denial of service if a malformed media file is opened.

Multiple vulnerabilities were discovered in the VLC media player, which could result in the execution of arbitrary code or denial of service if a malformed media file is opened.

The host is installed with Cisco Jabber before 12.8.5 or 12.9.x before 12.9.4 and is prone to an unauthorized access vulnerability. A flaw is present in application, which is due to improper validation of message contents. Successful exploitation could allow an unauthenticated, remote attacker to modify the application configuration.

The host is installed with Cisco Jabber before 12.8.5 or 12.9.x before 12.9.4 and is prone to an information disclosure vulnerability. A flaw is present in application, which is due to improper validation of message contents. Successful exploitation could allow an authenticated, remote attacker to gain access to sensitive information.

The host is installed with Cisco Jabber before 12.8.5 or 12.9.x before 12.9.4 and is prone to an arbitrary command execution vulnerability. A flaw is present in application, which fails to properly handle improper validation of message contents. Successful exploitation could allow remote attackers to inject arbitrary script and potentially execute arbitrary commands on some platforms.

The host is installed with Cisco Jabber before 12.8.5 or 12.9.x before 12.9.4 and is prone to an arbitrary code execution vulnerability. A flaw is present in application, which fails to properly handle improper validation of message contents. Successful exploitation could allow remote attackers to inject arbitrary script and potentially execute arbitrary commands on some platforms.


Pages:      Start    8507    8508    8509    8510    8511    8512    8513    8514    8515    8516    8517    8518    8519    8520    ..   19712

© SecPod Technologies