[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 16267 Download | Alert*

The host is installed with Pidgin 2.10.0 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle DBUS used for certain cleartext communication. Successful exploitation allows attackers to obtain sensitive information via a dbus session monitor.

The host is installed with Pidgin before 2.14.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle the g_markup_escape_text function. Successful exploitation allows remote attackers to cause a denial of service (crash) via invalid UTF-8 sequences that trigger use of invalid pointers and an out-of-bounds read, related to interactions with ...

The host is installed with Jenkins LTS 2.235.x or Jenkins rolling release before 2.236 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle ReadyAPI Functional Testing Plugin. Successful exploitation allows attackers to view passwords stored in job config.xml files with extended read permission.

The host is installed with Xcode before 11.2 on Apple Mac OS X 10.14.4 or later or Git 2.14.x before 2.14.6, 2.15.x before 2.15.4, 2.16.x before 2.16.6, 2.17.x before 2.17.3, 2.18.x before 2.18.2, 2.19.x before 2.19.3, 2.20.x before 2.20.2, 2.21.x before 2.21.1, 2.22.x before 2.22.2, 2.23.x before 2.23.1 or 2.24.x before 2.24.1 and is prone to a security bypass vulnerability. A flaw is present in ...

The host is installed with Cisco Jabber before 12.8.7 or 12.9.x before 12.9.6 and is prone to a denial of service vulnerability. A flaw is present in application, which fails to properly handle improper validation of message content. Successful exploitation could allow an authenticated, remote attacker to cause a DoS condition.

The host is installed with Cisco Jabber before 12.8.7 or 12.9.x before 12.9.6 and is prone to a certificate validation vulnerability. A flaw is present in application, which fails to properly handle improper validation of certificates. Successful exploitation could allow an unauthenticated, remote attacker to intercept protected network traffic.

The host is installed with Wireshark 3.4.0 through 3.4.3 or 3.2.0 through 3.2.11 and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle unsafe URLs. Successful exploitation allows attackers to crash Wireshark by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.

The host is installed with Opera Browser before 11.60 and is prone to address spoofing vulnerability. A flaw is present in the application, which fails to properly handle the unspecified homograph characters. Successful exploitation allows remote attackers to spoof the address bar via unspecified homograph characters.

The host is installed with Wireshark 3.4.0 to 3.4.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an issue in USB HID dissector. Successful exploitation allows attackers to crash Wireshark by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.

The host is installed with Wireshark 3.4.0 to 3.4.2 and is prone to a memory leak vulnerability. A flaw is present in the application, which fails to properly handle an issue in USB HID dissector. Successful exploitation allows attackers to leak memory and cause denial of service.


Pages:      Start    746    747    748    749    750    751    752    753    754    755    756    757    758    759    ..   1626

© SecPod Technologies