[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

254492

 
 

909

 
 

198437

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 197552 Download | Alert*

The host is installed with Pidgin before 2.14.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle the g_markup_escape_text function. Successful exploitation allows remote attackers to cause a denial of service (crash) via invalid UTF-8 sequences that trigger use of invalid pointers and an out-of-bounds read, related to interactions with ...

The host is installed with Jenkins LTS 2.235.x or Jenkins rolling release before 2.236 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle ReadyAPI Functional Testing Plugin. Successful exploitation allows attackers to view passwords stored in job config.xml files with extended read permission.

The host is installed with Xcode before 11.2 on Apple Mac OS X 10.14.4 or later or Git 2.14.x before 2.14.6, 2.15.x before 2.15.4, 2.16.x before 2.16.6, 2.17.x before 2.17.3, 2.18.x before 2.18.2, 2.19.x before 2.19.3, 2.20.x before 2.20.2, 2.21.x before 2.21.1, 2.22.x before 2.22.2, 2.23.x before 2.23.1 or 2.24.x before 2.24.1 and is prone to a security bypass vulnerability. A flaw is present in ...

The host is installed with Cisco Jabber before 12.8.7 or 12.9.x before 12.9.6 and is prone to a denial of service vulnerability. A flaw is present in application, which fails to properly handle improper validation of message content. Successful exploitation could allow an authenticated, remote attacker to cause a DoS condition.

The host is installed with Cisco Jabber before 12.8.7 or 12.9.x before 12.9.6 and is prone to a certificate validation vulnerability. A flaw is present in application, which fails to properly handle improper validation of certificates. Successful exploitation could allow an unauthenticated, remote attacker to intercept protected network traffic.

The host is installed with Wireshark 3.4.0 through 3.4.3 or 3.2.0 through 3.2.11 and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle unsafe URLs. Successful exploitation allows attackers to crash Wireshark by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.

The host is missing a security update according to Wireshark Advisory. The update is required to fix a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle unsafe URLs. Successful exploitation allows attackers to crash Wireshark by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.

The host is installed with Opera Browser before 11.60 and is prone to address spoofing vulnerability. A flaw is present in the application, which fails to properly handle the unspecified homograph characters. Successful exploitation allows remote attackers to spoof the address bar via unspecified homograph characters.

The host is installed with Opera Browser before 11.60 and is prone to address spoofing vulnerability. A flaw is present in the application, which fails to properly handle the unspecified homograph characters. Successful exploitation allows remote attackers to spoof the address bar via unspecified homograph characters.

The host is installed with Opera Browser before 11.60 and is prone to address spoofing vulnerability. A flaw is present in the application, which fails to properly handle the unspecified homograph characters. Successful exploitation allows remote attackers to spoof the address bar via unspecified homograph characters.


Pages:      Start    8544    8545    8546    8547    8548    8549    8550    8551    8552    8553    8554    8555    8556    8557    ..   19755

© SecPod Technologies