[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 1792 Download | Alert*

The host is missing a security update according to Apple Security Advisory, APPLE-SA-2012-06-12-1. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle some unknown vectors. Successful exploitation allows remote attackers to affect confidentiality, integrity, and availability.

The host is missing a security update according to Wireshark Advisory. The update is required to fix a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle an issue in epan/dissectors/packet-lte-rrc.c file. Successful exploitation allows attackers to crash the LTE RRC dissector could crash.

The host is missing a security update according to Wireshark Advisory. The update is required to fix a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle an issue in plugins/epan/wimax/msg_dlmap.c file. Successful exploitation allows attackers to crash the WiMax DLMAP dissector could crash.

The host is missing a security update according to Wireshark Advisory. The update is required to fix a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle an issue in epan/dissectors/packet-wireguard.c file. Successful exploitation allows attackers to crash the WireGuard dissector could crash.

The host is missing a security update according to Wireshark Advisory. The update is required to fix a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle an issue in epan/dissectors/packet-eap.c file. Successful exploitation allows attackers to crash the EAP dissector could crash.

The host is missing a security update according to Wireshark Advisory. The update is required to fix a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle issues in epan/dissectors/packet-btatt.c file. Successful exploitation allows attackers to crash the bluetooth attribute dissector.

The host is missing a high severity security update according to the Google advisory and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows an attacker to cause unspecified impact.

The host is missing a critical security update according to Adobe advisory, APSB23-61. The update is required to fix an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could cause memory leakage.

The host is missing a critical security update according to advisory VMSA-2023-0008 and prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues. Successful exploitation allows an attacker to execute code.

The host is missing a security update according to Wireshark Advisory. The update is required to fix a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle a issue in NFS dissector. Successful exploitation allows attackers to crash wireshark by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.


Pages:      Start    72    73    74    75    76    77    78    79    80    81    82    83    84    85    ..   179

© SecPod Technologies