[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 16267 Download | Alert*

The host is installed with Wireshark 3.4.0 through 3.4.5 and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle the DVB-S2-BB dissector issue. Successful exploitation allows Wireshark to consume excessive CPU resources by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.

The host is installed with Wireshark 1.8.x before 1.8.3 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the dissect_hsrp function in epan/dissectors/packet-hsrp.c in the HSRP dissector. Successful exploitation allows remote attackers to cause a denial of service (infinite loop).

The host is installed with Wireshark 1.8.x before 1.8.3 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle OUI data structures. Successful exploitation allows remote attackers to cause a denial of service (assertion failure and application exit).

The host is installed with Wireshark 1.8.x before 1.8.3 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle the dissect_tlv function in epan/dissectors/packet-ldp.c in the LDP dissector. Successful exploitation allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.

The host is installed with Pidgin before 2.10.5 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted inline image in a message. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Jenkins LTS through 2.277.1 or Jenkins rolling release through 2.286 and is prone to a view name validation bypass vulnerability. A flaw is present in the application, which fails to properly check that a newly created view has an allowed name. Successful exploitation allows attackers with View/Create permission to create views with invalid or already-used names.

The host is installed with Jenkins LTS through 2.277.1 or Jenkins rolling release through 2.286 and is prone to an improper input validation vulnerability. A flaw is present in the application, which fails to properly handle an object type validation issue. Successful exploitation allows attackers with Computer/Configure permission to replace a node with one of a different type.

The host is installed with Apache OpenOffice before 4.1.10 and is prone to an untrusted code execution vulnerability. A flaw is present in the application, which fails to handle non-http(s) hyperlinks. Successful exploitation could allow attackers to cause untrusted code execution.

The host is installed with OpenOffice.org less than or equal to 3.4 or LibreOffice before 3.5.5 and is prone to multiple heap based buffer overflow vulnerabilities. The flaws are present in the applications, which fail to handle a crafted Open Document Text (.odt) file with (1) a child tag within an incorrect parent tag, duplicate tags, or a Base64 ChecksumAttribute whose length is not evenly divi ...

The host is installed with OpenOffice.org (OOo) 3.3 or LibreOffice before 3.5.3 and is prone to an integer overflow vulnerability. A flaw is present in the applications, which fails to properly handle the length of an Escher graphics record in a PowerPoint (.ppt) document. Successful exploitation could allow attackers to crash the service.


Pages:      Start    742    743    744    745    746    747    748    749    750    751    752    753    754    755    ..   1626

© SecPod Technologies