[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250363

 
 

909

 
 

196124

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 195386 Download | Alert*

The host is installed with Opera Browser before 11.62 and is prone to address spoofing vulnerability. A flaw is present in the application, which fails to properly handle the reloads and redirects. Successful exploitation allows remote attackers to spoof the address field by triggering a page reload followed by a redirect to a different domain.

The host is installed with Opera Browser before 11.62 and is prone to address spoofing vulnerability. A flaw is present in the application, which fails to properly handle the reloads and redirects. Successful exploitation allows remote attackers to spoof the address field by triggering a page reload followed by a redirect to a different domain.

The host is installed with Opera Browser before 11.62 and is prone to address spoofing vulnerability. A flaw is present in the application, which fails to handle a crafted styling that causes page content to be displayed outside of the intended content area. Successful exploitation allows remote attackers tospoof the address field and security dialogs.

The host is installed with Pidgin before 2.10.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle msn_oim_report_to_user function in oim.c in the MSN protocol plugin in libpurple in Pidgin. Successful exploitation could allow remote servers to cause a denial of service or application crash.

The host is installed with Pidgin before 2.10.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle msn_oim_report_to_user function in oim.c in the MSN protocol plugin in libpurple in Pidgin. Successful exploitation could allow remote servers to cause a denial of service or application crash.

Multiple vulnerabilities has been discovered and corrected in pidgin: The pidgin_conv_chat_rename_user function in gtkconv.c in Pidgin before 2.10.2 allows remote attackers to cause a denial of service by changing a nickname while in an XMPP chat room . The msn_oim_report_to_user function in oim.c in the MSN protocol plugin in libpurple in Pidgin before 2.10.2 allows remote servers to cause a den ...

The host is installed with Pidgin before 2.10.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle pidgin_conv_chat_rename_user function in gtkconv.c in Pidgin. Successful exploitation could allow remote attackers to cause a denial of service by changing a nickname while in an XMPP chat room.

The host is installed with Pidgin before 2.10.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle pidgin_conv_chat_rename_user function in gtkconv.c in Pidgin. Successful exploitation could allow remote attackers to cause a denial of service by changing a nickname while in an XMPP chat room.

The host is installed with Oracle Java SE 1.6.0_22 before 1.6.0_24 or 1.5.0_26 before 1.5.0_28 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle Hotspot. Successful exploitation could allow attackers to affect confidentiality, integrity, and availability.

The host is installed with VideoLAN VLC media player before 2.0.1 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted Real RTSP stream. Successful exploitation could allow attackers to crash the service.


Pages:      Start    8081    8082    8083    8084    8085    8086    8087    8088    8089    8090    8091    8092    8093    8094    ..   19538

© SecPod Technologies