[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 16267 Download | Alert*

The host is installed with Wireshark 3.4.0 and is prone to a memory leak vulnerability. A flaw is present in the application, which fails to properly handle an issue in dissection engine. Successful exploitation allows attackers to cause denial of service.

The host is installed with Wireshark 3.4.0 or 3.2.0 to 3.2.8 and is prone to a memory leak vulnerability. A flaw is present in the application, which fails to properly handle an issue in Kafka protocol. Successful exploitation allows attackers to cause denial of service.

The host is installed with Apache Cassandra 1.2.0 through 1.2.19, 2.0.0 through 2.0.13 or 2.1.0 through 2.1.3 and is prone to an arbitrary java code execution vulnerability. A flaw is present in the application, which fails to properly a issue in the JMX/RMI interface. Successful exploitation allows remote attackers to execute arbitrary Java code via an RMI request.

The host is installed with Apache Cassandra 3.8 through 3.11.1 and is prone to an arbitrary java code execution vulnerability. A flaw is present in the application, which fails to properly a issue in the JMX/RMI interface. Successful exploitation allows remote attackers to execute arbitrary Java code via an RMI request.

The host is installed with Apache Cassandra 2.1.x before 2.1.22, 2.2.x before 2.2.18, 3.0.x before 3.0.22 or 3.11.x before 3.11.8 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly a issue which leads to manipulation of RMI registry. Successful exploitation allows attacker to perform a man-in-the-middle attack and capture user nam ...

The host is installed with Audacity through 2.3.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle the temporary directory permissions. Successful exploitation could allow any user on the system to read and play the temporary audio .au files located there.

The host is installed with Opera before 11.66 or 12.x before 12.01 and is prone to cross-site scripting (XSS) vulnerability. A flaw is present in the application, which ignores some characters in HTML documents in unspecified circumstances. Successful exploitation allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted document.

The host is installed with Opera before 11.66 or 12.x before 12.01 and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to handle a small window for the download dialog. Successful exploitation allows user-assisted remote attackers to trick users into downloading and executing arbitrary files.

The host is installed with Opera before 11.66 or 12.x before 12.01 and is prone to Cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to properly escape characters in DOM elements. Successful exploitation allows remote attackers to bypass cross-site scripting (XSS) protection mechanisms via a crafted HTML document.

The host is installed with Opera before 11.66 or 12.x before 12.01 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to a "low severity issue." Successful exploitation has unknown impact and attack vectors.


Pages:      Start    751    752    753    754    755    756    757    758    759    760    761    762    763    764    ..   1626

© SecPod Technologies