[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 196303 Download | Alert*

The host is installed with Oracle Java SE through 11.0.3 or 12.0.1 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Security. Successful exploitation allows attackers to affect confidentiality.

The host is installed with Oracle Java SE through 11.0.3 or 12.0.1 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to JSSE. Successful exploitation allows attackers to affect confidentiality.

The host is installed with Wireshark 2.4.0 to 2.4.15, 2.6.0 to 2.6.9 or 3.0.0 to 3.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an issue in epan/asn1.c file. Successful exploitation allows attackers to crash the ASN.1 BER dissector.

The host is installed with VideoLAN VLC media player through 3.0.7.1 and is prone to an integer underflow vulnerability. A flaw is present in the application, which fails to properly handle an issue in modules/demux/mp4/mp4.c file. Successful exploitation could allow remote attackers to cause a denial of service or possibly have unspecified other impact.

Multiple security issues were discovered in the VLC media player, which could result in the execution of arbitrary code or denial of service if a malformed file/stream is processed.

Multiple security issues were discovered in the VLC media player, which could result in the execution of arbitrary code or denial of service if a malformed file/stream is processed.

Multiple security issues were discovered in the VLC media player, which could result in the execution of arbitrary code or denial of service if a malformed file/stream is processed.

The host is installed with GlobalProtect Agent through 4.1.10 and is prone to a local information disclosure vulnerability. A flaw is present in the application, which fails to properly handle the session tokens. Successful exploitation could allow attackers to obtain sensitive information that may aid in launching further attacks.

The host is installed with Zoom Client before 4.4.53932.0709 and is prone to a webcam hijack vulnerability. A flaw is present in the application, which fails to handle an issue in the zoom web server. Successful exploitation allows remote attackers to force a user to join a video call with the video camera active.

The host is installed with Jenkins LTS through 2.164.1 or Jenkins rolling release through 2.171 and is prone to a cross-site scripting vulnerability. The flaw is present in the application, which fails to properly escape job URLs. Successful exploitation could allow attackers to cause unauthorized modification.


Pages:      Start    8344    8345    8346    8347    8348    8349    8350    8351    8352    8353    8354    8355    8356    8357    ..   19630

© SecPod Technologies