[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26099 Download | Alert*

The host is installed with VideoLAN VLC media player before 3.0.8 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted file. Successful exploitation could allow attackers to trigger either a crash of VLC or an arbitratry code execution with the privileges of the target user.

The host is installed with VideoLAN VLC media player before 3.0.8 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted file. Successful exploitation could allow attackers to trigger either a crash of VLC or an arbitratry code execution with the privileges of the target user.

The host is installed with VideoLAN VLC media player before 3.0.8 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted file. Successful exploitation could allow attackers to trigger either a crash of VLC or an arbitratry code execution with the privileges of the target user.

The host is installed with VideoLAN VLC media player before 3.0.8 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted file. Successful exploitation could allow attackers to trigger either a crash of VLC or an arbitratry code execution with the privileges of the target user.

The host is installed with VideoLAN VLC media player before 3.0.8 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted file. Successful exploitation could allow attackers to trigger either a crash of VLC or an arbitratry code execution with the privileges of the target user.

The host is installed with VideoLAN VLC media player before 3.0.8 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted file. Successful exploitation could allow attackers to trigger either a crash of VLC or an arbitratry code execution with the privileges of the target user.

The host is installed with OpenSSL 1.1.0 through 1.1.0j or through 1.1.1b or Oracle VM VirtualBox 5.2.x before 5.2.32 or 6.0.10 and is prone to an information disclosure vulnerability. A flaw is present in the way the ChaCha20-Poly1305 cipher uses reused nonce values. On successful exploitation, an attacker could cause serious confidentiality and integrity attacks on messages encrypted using a reu ...

The host is installed with Jenkins LTS through 2.164.1 or Jenkins rolling release through 2.171 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an issue in URL validation. Successful exploitation could allow attackers to allow unauthorized modification.

The host is installed with Jenkins LTS through 2.164.1 or Jenkins rolling release through 2.171 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle an issue in CLI authentication. Successful exploitation could allow attackers to cause unauthorized modifications.

The host is installed with Jenkins LTS through 2.150.1 or Jenkins rolling release through 2.158 and is prone to an improper authorization vulnerability. A flaw is present in the application, which fails to properly handle an issue in core/src/main/java/hudson/security/AuthenticationProcessingFilter2.java. Successful exploitation could allow attackers to extend the duration of active http sessions ...


Pages:      Start    1266    1267    1268    1269    1270    1271    1272    1273    1274    1275    1276    1277    1278    1279    ..   2609

© SecPod Technologies