[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 16267 Download | Alert*

The host is installed with Oracle VM VirtualBox before 6.1.20 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Core. Successful exploitation allows attackers to affect Confidentiality.

The host is installed with Oracle VM VirtualBox before 6.1.20 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Core. Successful exploitation allows attackers to affect Confidentiality, Integrity and Availability.

The host is installed with Oracle VM VirtualBox before 6.1.20 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Core. Successful exploitation allows attackers to affect Confidentiality, Integrity and Availability.

The host is installed with RealPlayer 16.0.2.32 and is prone to denial of service vulnerability. A flaw is present in the application, which fail to properly handle a crafted mp4 file. Successful exploitation allows remote attackers to cause a denial of service or divide-by-zero error and application crash.

The host is installed with Wireshark through 2.2.11 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly strip '\n' characters in the File_read_line function in epan/wslua/wslua_file.c. Successful exploitation allows remote attackers to cause a denial of service (buffer underflow and application crash) via a crafted packet that triggers the ...

The host is installed with LibreOffice before 6.1.6 or 6.2.x before 6.2.3 and is prone to an improper input validation vulnerability. A flaw is present in the application, which fails to process a hyperlink target. Successful exploitation could allow attackers to launch executable targets unconditionally.

The host is installed with LibreOffice 6.1.0.3 or 6.1.3.2 and is prone to a signature validation bypass vulnerability. A flaw is present in the application, which fails to properly handle issues in signature validation. Successful exploitation could allow attackers to use the incremental saving feature to add pages or annotations, which will display the body updates to the user without any action ...

The host is installed with VideoLAN VLC media player before 2.0.7 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle the web interface. Successful exploitation allows remote attackers to view directory listings via the 'dir' command or issue other commands without authenticating.

The host is installed with Oracle Java SE through 6u201, 7u191, 8u181 or 11 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Deployment (libpng). Successful exploitation allows attackers to affect availability..

The host is installed with Oracle Java SE through 7u45 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Hotspot. Successful exploitation allows attackers to affect confidentiality, integrity and availability.


Pages:      Start    745    746    747    748    749    750    751    752    753    754    755    756    757    758    ..   1626

© SecPod Technologies