[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

251139

 
 

909

 
 

196159

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26832 Download | Alert*

The host is installed with Apache OpenOffice before 4.1.13 and is prone to an inadequate encryption strength vulnerability. A flaw is present in the application, which fails to properly handle issues in master key which was poorly encoded resulting in weakening its entropy from 128 to 43 bits making the stored passwords. Successful exploitation could allow attackers to gain access to the users sto ...

The host is installed with Apache OpenOffice before 4.1.13 and is prone to an inadequate encryption strength vulnerability. A flaw is present in the application, which fails to properly handle issues in master key which was poorly encoded resulting in weakening its entropy from 128 to 43 bits making the stored passwords. Successful exploitation could allow attackers to gain access to the users sto ...

The host is installed with Apache OpenOffice before 4.1.13 and is prone to an inadequate encryption strength vulnerability. A flaw is present in the application, which fails to properly handle the issues in encryption of initialization vector. Successful exploitation could allow attackers to gain access to the user's configuration data.

The host is installed with Apache OpenOffice before 4.1.13 and is prone to an inadequate encryption strength vulnerability. A flaw is present in the application, which fails to properly handle the issues in encryption of initialization vector. Successful exploitation could allow attackers to gain access to the user's configuration data.

The host is installed with Oracle VM VirtualBox before 6.1.36 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Core. Successful exploitation allows attackers to affect Confidentiality.

The host is installed with Oracle VM VirtualBox before 6.1.36 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Core. Successful exploitation allows attackers to affect Confidentiality.

The host is installed with Wireshark 3.4.0 before 3.4.10 or 3.2.0 before 3.2.18 and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle large loop issue in the PNRP dissector. On Successful exploitation,it is possible to make Wireshark consume excessive CPU resources by injecting a malformed packet onto the wire or by convincing someo ...

The host is installed with Oracle VM VirtualBox before 6.1.32 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Core. Successful exploitation allows attackers to affect Confidentiality.

The host is installed with VMware Workstation 16.x before 16.2.0 and is prone to a heap-overflow vulnerability. A flaw is present in the application, which fails to handle an issue in the CD-ROM device emulation. Successful exploitation allows attackers with access to a virtual machine with CD-ROM device emulation to exploit this vulnerability in conjunction with other issues to execute code on th ...

The host is installed with Wireshark 3.4.0 before 3.4.11 or 3.6.0 before 3.6.1 and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle the Sysdig Event dissector crash issue. Successful exploitation could allow attackers to make Wireshark crash by injecting a malformed packet onto the wire or by convincing someone to read a malformed ...


Pages:      Start    1304    1305    1306    1307    1308    1309    1310    1311    1312    1313    1314    1315    1316    1317    ..   2683

© SecPod Technologies