[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26496 Download | Alert*

Mozilla Firefox ESR 115.4, and Thunderbird 115.4.1: An attacker could have created a malicious link using bidirectional characters to spoof the location in the address bar when visited.

The host is installed with VideoLAN VLC media player through 3.0.17.4 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle an issue in the VNC module in VideoLAN. On successful exploitation, attackers can trick a user into opening a crafted playlist or connecting to a rogue VNC server, to crash VLC or execute code under some conditio ...

Mozilla Thunderbird 115.0.1: Thunderbird allowed the Text Direction Override Unicode Character in filenames. An email attachment could be incorrectly shown as being a document file, while in fact it was an executable file. Newer versions of Thunderbird will strip the character and show the correct file extension.

The host is installed with Google Chrome before 117.0.5938.132 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 117.0.5938.132 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Wireshark 3.6.x before 3.6.17 or 4.0.x before 4.0.9 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the packet injection or crafted capture file. Successful exploitation allows attackers to make Wireshark consume excessive CPU resources by injecting a malformed packet onto the wire or by convincing s ...

The host is installed with Atlassian Confluence Server 8.0.0 before 8.3.3, 8.4.0 before 8.4.3, or 8.5.0 before 8.5.2 and is prone to a broken access control vulnerability. A flaw is present in the application which fails to properly handle unspecified vectors. Successful exploitation allows attackers to create unauthorized Confluence administrator accounts and access Confluence instances.

The host is installed with Node.js 20.0.x before 20.5.1 and is prone to a path traversal vulnerability. A flaw is present in the application which fails to properly handle the buffers in file system APIs used in the experimental permission model. Successful exploitation allows attackers to cause a traversal path to bypass when verifying file permissions.

The host is installed with Apache Tomcat 9.0.70 through 9.0.80, or 8.5.85 through 8.5.93, or Atlassian Bamboo CI server 8.1.0 before 9.2.7, or 9.3.0 before 9.3.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle unspecified impact. Successful exploitation allows attackers cause a denial of service.

The host is installed with Node.js 16.0.x before 16.20.2, 18.0.x before 18.17.1, or 20.0.x before 20.5.1 and is prone to a security policy bypass vulnerability. A flaw is present in the application which fails to handle issues in the experimental policy mechanism in all active release lines. Successful exploitation allows attackers to bypass the policy mechanism and require modules outside of the ...


Pages:      Start    1062    1063    1064    1065    1066    1067    1068    1069    1070    1071    1072    1073    1074    1075    ..   2649

© SecPod Technologies