[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 193626 Download | Alert*

The host is installed with Wireshark 2.2.x through 2.2.11 and is prone to a null pointer dereference vulnerability. A flaw is present in the application, which fails to properly validate an IPv4 address. Successful exploitation could allow remote attackers to produce unknown impact.

The host is installed with VideoLAN VLC media player through 2.2.8 and is prone to a type conversion vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation could allow remote attackers to change the type of a box between a read operation and a free operation.

The host is installed with VideoLAN VLC media player through 2.2.8 and is prone to a type conversion vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation could allow remote attackers to change the type of a box between a read operation and a free operation.

Hans Jerry Illikainen discovered a type conversion vulnerability in the MP4 demuxer of the VLC media player, which could result in the execution of arbitrary code if a malformed media file is played. This update upgrades VLC in stretch to the new 3.x release series . In addition two packages needed to be rebuild to ensure compatibility with VLC 3; phonon-backend-vlc and goldencheetah . VLC in jes ...

Hans Jerry Illikainen discovered a type conversion vulnerability in the MP4 demuxer of the VLC media player, which could result in the execution of arbitrary code if a malformed media file is played. This update upgrades VLC in stretch to the new 3.x release series . In addition two packages needed to be rebuild to ensure compatibility with VLC 3; phonon-backend-vlc and goldencheetah . VLC in jes ...

The host is installed with Wireshark 2.4.0 to 2.4.2 or 2.2.0 to 2.2.10 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the NetBIOS dissector issue. Successful exploitation allows attackers to cause an application crash.

dotnet-hostfxr-8.0 is installed

The host is installed with Atlassian Bamboo CI server 8.1.0 before 9.2.5, or 9.3.0 before 9.3.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an issue in the unspecified vectors. Successful exploitation could allow an unauthenticated attacker to expose assets in your environment susceptible to exploitation which has no impac ...

The host is installed with Apache Cassandra 2.1.x through 2.1.22, 2.2.x through 2.2.19, 3.0.x through 3.0.23 or 3.11.x through 3.11.9 and is prone to an authentication spoofing bypass vulnerability. A flaw is present in the application, which fails to properly handle an issue the 'dc' or 'rack' internode_encryption setting. Successful exploitation allows attacker to use the unencrypted connection ...

The host is installed with Apache Cassandra 2.1.x through 2.1.22, 2.2.x through 2.2.19, 3.0.x through 3.0.23 or 3.11.x through 3.11.9 and is prone to an authentication spoofing bypass vulnerability. A flaw is present in the application, which fails to properly handle an issue the 'dc' or 'rack' internode_encryption setting. Successful exploitation allows attacker to use the unencrypted connection ...


Pages:      Start    7741    7742    7743    7744    7745    7746    7747    7748    7749    7750    7751    7752    7753    7754    ..   19362

© SecPod Technologies