[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26349 Download | Alert*

The host is installed with Wireshark 3.4.0 through 3.4.6 or 3.2.0 through 3.2.14 and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle the DNP dissector issue. Successful exploitation leads to wireshark crash by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.

The host is installed with Jenkins LTS through 2.289.1 or Jenkins rolling release through 2.299 and is prone to a session fixation vulnerability. A flaw is present in the application, which fails to properly handle issues with validation of sessions. Successful exploitation could allows attackers to use social engineering techniques to gain administrator access to Jenkins.

The host is installed with Jenkins LTS through 2.289.1 or Jenkins rolling release through 2.299 and is prone to an incorrect authorization vulnerability. A flaw is present in the application, which fails to properly handle issues with permission checks. Successful exploitation could allows users to cancel queue items and abort builds of jobs for which they have Item/Cancel permission even when the ...

The host is installed with Wireshark 3.4.0 through 3.4.5 and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle the DVB-S2-BB dissector issue. Successful exploitation allows Wireshark to consume excessive CPU resources by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.

The host is installed with Visual Studio and .NET Core products and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause denial of service attacks.

The host is installed with RealPlayer 16.0.2.32 and is prone to denial of service vulnerability. A flaw is present in the application, which fail to properly handle a crafted mp4 file. Successful exploitation allows remote attackers to cause a denial of service or divide-by-zero error and application crash.

The host is installed with LibreOffice before 6.1.6 or 6.2.x before 6.2.3 and is prone to an improper input validation vulnerability. A flaw is present in the application, which fails to properly handle issues with LibreOffice hyperlink. Successful exploitation allows an attacker to construct documents containing hyperlinks pointing to the location of an executable on the target users file system.

The host is installed with LibreOffice 6.0.6.2 or 6.1.3.2 and is prone to a signature validation bypass vulnerability. A flaw is present in the application, which fails to properly handle issues in signature validation. Successful exploitation could allow attackers to use the incremental saving feature to add pages or annotations, which will display the body updates to the user without any action ...

The host is installed with VideoLAN VLC media player before 2.0.7 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle the web interface. Successful exploitation allows remote attackers to view directory listings via the 'dir' command or issue other commands without authenticating.

The host is installed with Opera Browser before 11.60 and is prone to address spoofing vulnerability. A flaw is present in the application, which fails to properly handle the unspecified homograph characters. Successful exploitation allows remote attackers to spoof the address bar via unspecified homograph characters.


Pages:      Start    1222    1223    1224    1225    1226    1227    1228    1229    1230    1231    1232    1233    1234    1235    ..   2634

© SecPod Technologies