[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 197798 Download | Alert*

The host is installed with Pidgin 2.10.0 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle DBUS used for certain cleartext communication. Successful exploitation allows attackers to obtain sensitive information via a dbus session monitor.

The host is installed with Pidgin before 2.14.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle the g_markup_escape_text function. Successful exploitation allows remote attackers to cause a denial of service (crash) via invalid UTF-8 sequences that trigger use of invalid pointers and an out-of-bounds read, related to interactions with ...

The host is installed with Jenkins LTS 2.235.x or Jenkins rolling release before 2.236 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle ReadyAPI Functional Testing Plugin. Successful exploitation allows attackers to view passwords stored in job config.xml files with extended read permission.

The host is installed with Xcode before 11.2 on Apple Mac OS X 10.14.4 or later or Git 2.14.x before 2.14.6, 2.15.x before 2.15.4, 2.16.x before 2.16.6, 2.17.x before 2.17.3, 2.18.x before 2.18.2, 2.19.x before 2.19.3, 2.20.x before 2.20.2, 2.21.x before 2.21.1, 2.22.x before 2.22.2, 2.23.x before 2.23.1 or 2.24.x before 2.24.1 and is prone to a security bypass vulnerability. A flaw is present in ...

The host is installed with Cisco Jabber before 12.8.7 or 12.9.x before 12.9.6 and is prone to a denial of service vulnerability. A flaw is present in application, which fails to properly handle improper validation of message content. Successful exploitation could allow an authenticated, remote attacker to cause a DoS condition.

The host is installed with Cisco Jabber before 12.8.7 or 12.9.x before 12.9.6 and is prone to a certificate validation vulnerability. A flaw is present in application, which fails to properly handle improper validation of certificates. Successful exploitation could allow an unauthenticated, remote attacker to intercept protected network traffic.

The host is installed with Wireshark 3.4.0 through 3.4.3 or 3.2.0 through 3.2.11 and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle unsafe URLs. Successful exploitation allows attackers to crash Wireshark by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.

The host is missing a security update according to Wireshark Advisory. The update is required to fix a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle unsafe URLs. Successful exploitation allows attackers to crash Wireshark by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.

The host is installed with Opera Browser before 11.60 and is prone to address spoofing vulnerability. A flaw is present in the application, which fails to properly handle the unspecified homograph characters. Successful exploitation allows remote attackers to spoof the address bar via unspecified homograph characters.

The host is installed with Opera Browser before 11.60 and is prone to address spoofing vulnerability. A flaw is present in the application, which fails to properly handle the unspecified homograph characters. Successful exploitation allows remote attackers to spoof the address bar via unspecified homograph characters.


Pages:      Start    8574    8575    8576    8577    8578    8579    8580    8581    8582    8583    8584    8585    8586    8587    ..   19779

© SecPod Technologies