[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31600 Download | Alert*

Mozilla Thunderbird 102.10 : OCSP revocation status of recipient certificates was not checked when sending S/Mime encrypted email, and revoked certificates would be accepted. Thunderbird versions from 68 to 102.9.1 were affected by this bug.

The host is installed with Google Chrome before 116.0.5845.187 and is prone to a heap buffer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Opera before 102.0.4880.51 and is prone to a heap buffer overflow vulnerability. A flaw is present in the application, which fails handle issues in libwebp. Successful exploitation allows attackers to cause unspecifed impact.

The host is installed with Brave Browser before 1.57.64 and is prone to a heap buffer overflow vulnerability. A flaw is present in the application, which fails to handle issues in libwebp. Successful exploitation allows attackers to cause unspecified impact.

The host is installed with Microsoft Visual Studio Code Python Extension before 2020.9.114305 and is prone to a remote code execution vulnerability. A flaw is present in the aplication which fails to handle unspecified vectors. Successfull exploitation allows an attacker to cause unspecified impact.

The host is installed with Python before 3.6.11, 3.7.x before 3.7.7, or 3.8.x before 3.8.2 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to properly handle an issue in heappushpop function in heapq. Successful exploitation allows attackers to cause use-after-free vulnerability.

The host is installed with Wireshark 4.0.0 before 4.0.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the issue in RTPS dissector. Successful exploitation allows attackers to crash Wireshark by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.by convincing someone to r ...

The host is installed with Apache HTTP Server 2.0.0 through 2.4.13.2 and is prone to a NULL pointer dereference vulnerability. A flaw is present in the application, which fails to properly handle issues in mod_auth_openidc is an authentication and authorization module. Successful exploitation could allows attackers to cause denial of service through a crafted cookies.

The host is installed with Wireshark 3.6.0 before 3.6.13 or Wireshark 4.0.0 before 4.0.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the issue in LISP dissector large loop. Successful exploitation could allow attackers to make Wireshark consume excessive CPU resources by injecting a malformed packet onto the wire or by con ...

The host is installed with Wireshark 3.6.0 before 3.6.13 or Wireshark 4.0.0 before 4.0.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the issue in RPCoRDMA dissector. Successful exploitation could allow attackers to make Wireshark consume excessive CPU resources by injecting a malformed packet onto the wire or by convincing ...


Pages:      Start    1399    1400    1401    1402    1403    1404    1405    1406    1407    1408    1409    1410    1411    1412    ..   3159

© SecPod Technologies