[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 16267 Download | Alert*

The host is installed with VideoLAN VLC media player 3.0.11 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle an issue in the vlc_input_attachment_New component. Successful exploitation allows attackers to cause an out-of-bounds read via a crafted .avi file.

The host is installed with VideoLAN VLC media player 3.0.11 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle an issue in the AVI_ExtractSubtitle component. Successful exploitation allows attackers to cause an out-of-bounds read via a crafted .avi file.

The host is installed with VideoLAN VLC media player 3.0.11 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle an issue in the __Parse_indx component. Successful exploitation allows attackers to cause an out-of-bounds read via a crafted .avi file.

The host is installed with Oracle VM VirtualBox before 6.1.24 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Core. Successful exploitation allows attackers to affect Confidentiality, Integrity and Availability.

The host is installed with Oracle VM VirtualBox before 6.1.24 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Core. Successful exploitation allows attackers to affect Availability.

The host is installed with Oracle VM VirtualBox before 6.1.24 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Core. Successful exploitation allows attackers to affect Confidentiality, Integrity and Availability.

The host is installed with Oracle Java SE 8.x through 8u291, 11.x through 11.0.11 or 16.x through 16.0.1 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Hotspot. Successful exploitation allows attackers to affect confidentiality, integrity and availability.

The host is installed with Wireshark 3.2.0 through 3.2.14 or 3.4.0 through 3.4.6 and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle the DNP dissector issue. Successful exploitation leads to wireshark crash by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.

The host is installed with Jenkins LTS through 2.289.1 or Jenkins rolling release through 2.299 and is prone to a session fixation vulnerability. A flaw is present in the application, which fails to properly handle issues with validation of sessions. Successful exploitation could allows attackers to use social engineering techniques to gain administrator access to Jenkins.

The host is installed with Jenkins LTS through 2.289.1 or Jenkins rolling release through 2.299 and is prone to an incorrect authorization vulnerability. A flaw is present in the application, which fails to properly handle issues with permission checks. Successful exploitation could allows users to cancel queue items and abort builds of jobs for which they have Item/Cancel permission even when th ...


Pages:      Start    741    742    743    744    745    746    747    748    749    750    751    752    753    754    ..   1626

© SecPod Technologies