[Forgot Password]
Login  Register Subscribe

24547

 
 

132763

 
 

126291

 
 

909

 
 

105100

 
 

152

 
 
Paid content will be excluded from the download.

Filter
Matches : 14081 Download | Alert*

The host is installed with Python through versions 2.7.16 or 3.7.2 and is prone to a CRLF injection vulnerability. The flaw is present in the application, which fails to properly handle an issue in urrlib2. Successful exploitation allows attackers to initiate CRLF injection.

The host is installed with Python through versions 2.7.16 or 3.7.2 and is prone to an information disclosure vulnerability. The flaw is present in the application, which fails to properly handle unicode encoding during NKFC normalization. Successful exploitation allows attackers to locate cookies or authentication data and send that information to a different host.

Mozilla Firefox 67, Mozilla Firefox ESR 60.7 and Mozilla Thunderbird 60.7: A use-after-free vulnerability was discovered in the <code>png_image_free</code> function in the libpng library. This could lead to denial of service or a potentially exploitable crash when a malformed image is processed.

The host is installed with Oracle Java SE through 7u221, 8u212, 11.0.3 or 12.0.1 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to AWT. Successful exploitation allows attackers to affect integrity and availability.

The host is installed with VideoLAN VLC media player before 3.0.7 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle an invalid AVI file. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with OpenSSL 1.1.0 through 1.1.0j or through 1.1.1b and is prone to an information disclosure vulnerability. A flaw is present in the way the ChaCha20-Poly1305 cipher uses reused nonce values. On successful exploitation, an attacker could cause serious confidentiality and integrity attacks on messages encrypted using a reused nonce value.

The host is installed with Oracle VM VirtualBox before 5.2.32 or 6.0.10 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Core (OpenSSL). Successful exploitation allows attackers to affect confidentiality and integrity.

The host is installed with Wireshark 2.4.0 to 2.4.15, 2.6.0 to 2.6.9 or 3.0.0 to 3.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an issue in epan/asn1.c file. Successful exploitation allows attackers to crash the ASN.1 BER dissector and related dissectors.

The host is installed with VideoLAN VLC media player 3.0.7.1 and is prone to a heap-based buffer over-read vulnerability. A flaw is present in the application, which fails to properly handle an issue in modules/demux/mkv/demux.cpp file. Successful exploitation could allow remote attackers to cause a denial of service or possibly have unspecified other impact.

The host is installed with VideoLAN VLC media player through 3.0.7.1 and is prone to an integer underflow vulnerability. A flaw is present in the application, which fails to properly handle an issue in modules/demux/mp4/mp4.c file. Successful exploitation could allow remote attackers to cause a denial of service or possibly have unspecified other impact.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1408

© SecPod Technologies