The host is installed with VideoLAN VLC media player through 2.2.8 and is prone to a type conversion vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation could allow remote attackers to change the type of a box between a read operation and a free operation.
The host is installed with Wireshark 2.4.0 to 2.4.2 or 2.2.0 to 2.2.10 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the NetBIOS dissector issue. Successful exploitation allows attackers to cause an application crash.
The host is installed with Microsoft Edge Chromium before 108.0.1462.41 and is prone to a elevation of privilege vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.
The host is installed with Microsoft Edge Chromium before 108.0.1462.41 and is prone to a spoofing vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.
The host is installed with Microsoft Edge Chromium before 108.0.1462.41 and is prone to a elevation of privilege vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.
The host is installed with Google Chrome before 108.0.5359.124 or Microsoft Edge Chromium before 108.0.1462.54 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.
The host is installed with Google Chrome before 108.0.5359.124 or Microsoft Edge Chromium before 108.0.1462.54 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.
The host is installed with Google Chrome before 108.0.5359.124 or Microsoft Edge Chromium before 108.0.1462.54 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.
The host is installed with Google Chrome before 108.0.5359.124 or Microsoft Edge Chromium before 108.0.1462.54 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.
The host is installed with Google Chrome before 108.0.5359.124 or Microsoft Edge Chromium before 108.0.1462.54 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.