[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26616 Download | Alert*

The host is installed with Adobe Media Encoder through 15.4 and is prone to an improper memory access vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to cause arbitrary code execution.

Improper input validation for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow an unauthenticated user to potentially enable denial of service via adjacent access.

Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow a privileged user to potentially enable escalation of privilege via local access.

Improper initialization for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow a privileged user to potentially enable escalation of privilege via local access.

Out of bounds write for some Intel(R) PROSet/Wireless WiFi products may allow a privileged user to potentially enable escalation of privilege via local access.

Improper buffer restrictions for some Intel(R) PROSet/Wireless WiFi products may allow an unauthenticated user to potentially enable denial of service via network access.

Inadequate encryption strength for some Intel(R) PROSet/Wireless WiFi products may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.

The host is installed with VideoLAN VLC media player through 3.0.20 and is prone to an integer underflow vulnerability. A flaw is present in the application, which fails to properly handle issues in incorrect offset read. Successful exploitation could leads to an incorrect packet length.

The host is installed with VideoLAN VLC media player through 3.0.20 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to properly handle issues in incorrect offset read. Successful exploitation could leads to a Heap-Based Buffer Overflow in function GetPacket() and results in a memory corruption.

The host is installed with AnyDesk 7.0.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to abuse the discovery service located on udp port 50001 for DRDOS with a amplification factor of about 33.


Pages:      Start    6    7    8    9    10    11    12    13    14    15    16    17    18    19    ..   2661

© SecPod Technologies