[Forgot Password]
Login  Register Subscribe

25354

 
 

132811

 
 

144584

 
 

909

 
 

116218

 
 

156

 
 
Paid content will be excluded from the download.

Filter
Matches : 17414 Download | Alert*

The host is installed with Wireshark 2.6.0 before 2.6.17, 3.0.0 before 3.0.11 or 3.2.0 before 3.2.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a issue in NFS dissector. Successful exploitation allows attackers to crash wireshark by injecting a malformed packet onto the wire or by convincing someone to read a malformed pac ...

Mozilla Firefox 76 : Incorrect origin serialization of URLs with IPv6 addresses could lead to incorrect security checks

The host is installed with SaltStack Salt before 2019.2.4 or 3000.x before 3000.2 and is prone to an authentication vulnerability. A flaw exists exists within the application, which fails to properly handle an issue in the ClearFuncs class. Successful exploitation could allow remote attackers to gain root-equivalent access to the salt master and trigger minions to run arbitrary commands.

The host is installed with SaltStack Salt before 2019.2.4 or 3000.x before 3000.2 and is prone to a directory traversal vulnerability. A flaw exists exists within the application, which fails to properly handle an issue in the wheel module. Successful exploitation could allow remote attackers to read files outside of the intended directory.

Mozilla Firefox 74, Mozilla Firefox ESR 68.6, Mozilla Thunderbird 68.6, Google Chrome 80.0.3987.149 and Microsoft Edge 80.0.3987.149: The inputs to sctp_load_addresses_from_init are verified by sctp_arethere_unrecognized_parameters however, the two functions handled parameter bounds differently, resulting in out of bounds reads when parameters are partially outside a chunk.

The host is installed with Oracle WebLogic Server component in Oracle WebLogic Server through 10.3.6.0, 12.1.3.0, or 12.2.1.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle Console (Apache Log4j). Successful exploitation can cause unspecified impact.

The host is installed with Google Chrome and is prone to heap based buffer overflow vulnerability. A flaw is present in the browser which fails to perform bounds check on user supplied data before using it in GPU process. Successful exploitation could allow remote attackers to execute arbitrary code on the affected system.

The host is installed with Google Chrome before 10.0.648.204 and is prone to denial of service vulnerability. A flaw is present in the application which does not properly handle Cascading Style Sheets (CSS) token sequences. Successful exploitation allow remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale pointer".

The host is installed with Google Chrome before 10.0.648.204, Apple Safari before 5.0.6 or Apple iTunes before 10.5 and is prone to denial of service vulnerability. A flaw is present in the application which does not properly handle SVG text. Successful exploitation allow remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "sta ...

The host is installed with Google Chrome before 10.0.648.204 and is prone to denial of service vulnerability. A flaw is present in the application which does not properly handle parentage. Successful exploitation allow remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1741

© SecPod Technologies