[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 194074 Download | Alert*

The host is installed with Opera before 11.65 and is prone to cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to ensure that keyboard sequences are associated with a visible window. Successful exploitation allows remote attackers to conduct cross-site scripting (XSS) attacks or execute arbitrary code via a crafted web site, related to a "hidden keyboard ...

The host is installed with Opera before 11.65 and is prone to cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to properly restrict the opening of a pop-up window in response to the first click of a double-click action. Successful exploitation allows remote attackers to conduct cross-site scripting (XSS) attacks or execute arbitrary code via a crafted web ...

The host is installed with Opera before 11.65 and is prone to cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to properly restrict the opening of a pop-up window in response to the first click of a double-click action. Successful exploitation allows remote attackers to conduct cross-site scripting (XSS) attacks or execute arbitrary code via a crafted web ...

The host is installed with Opera before 11.65 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to properly restrict the reading of JSON strings. Successful exploitation allows remote attackers to perform cross-domain loading of JSON resources and consequently obtain sensitive information via a crafted web site.

The host is installed with Opera before 11.65 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to properly restrict the reading of JSON strings. Successful exploitation allows remote attackers to perform cross-domain loading of JSON resources and consequently obtain sensitive information via a crafted web site.

The host is installed with Opera before 11.65 and is prone to spoofing attacks. A flaw is present in the application, which fails to ensure that the address field corresponds to the displayed web page during unusually timed changes to this field. Successful exploitation allows remote attackers to conduct spoofing attacks via vectors involving navigation, reloads, and redirects.

The host is installed with Opera before 11.65 and is prone to spoofing attacks. A flaw is present in the application, which fails to ensure that the address field corresponds to the displayed web page during unusually timed changes to this field. Successful exploitation allows remote attackers to conduct spoofing attacks via vectors involving navigation, reloads, and redirects.

The host is missing a security update according to Wireshark Advisory. The update is required to fix a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle an issue in epan/dissectors/packet-lte-rrc.c file. Successful exploitation allows attackers to crash the LTE RRC dissector could crash.

Oracle Solaris 11 - ( CVE-2020-9428 )

In Wireshark 3.2.0 to 3.2.1, 3.0.0 to 3.0.8, and 2.6.0 to 2.6.14, the EAP dissector could crash. This was addressed in epan/dissectors/packet-eap.c by using more careful sscanf parsing.


Pages:      Start    7843    7844    7845    7846    7847    7848    7849    7850    7851    7852    7853    7854    7855    7856    ..   19407

© SecPod Technologies