[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255716

 
 

909

 
 

198991

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 16276 Download | Alert*

The host is installed with Wireshark 3.4.0 before 3.4.16 or 3.6.0 before 3.6.8 and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle the infinite loop issue in F5 Ethernet Trailer dissector. Successful exploitation could allow attackers to make Wireshark consume excessive CPU resources by injecting a malformed packet onto the wire o ...

The host is installed with Cisco Jabber before 14.0.1 and is prone to a denial of service vulnerability. A flaw is present in application, which fails to properly handle improper validation of message content. Successful exploitation could allow attacker to cause the application to terminate, resulting in a DoS condition..

The host is installed with GlobalProtect Agent 5.2.x before 5.2.9 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle an issue in the Connect Before Logon feature. Successful exploitation allows attackers to escalate SYSTEM or root privileges when authenticating with Connect Before Logon under certain circumstances.

The host is installed with GlobalProtect Agent 5.1.x before 5.1.10 or 5.2.x before 5.2.9 and is prone to an information exposure vulnerability. A flaw is present in the application, which fails to properly handle the credentials of the local user. On successful exploitation, when Single Sign-On credentials both for the local user account as well as the GlobalProtect login credentials are different ...

The host is installed with Zoom Client before 5.11.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle issues in the update process. Successful exploitation allows attackers to gain privileges of the root user.

The host is installed with Zoom Client 5.7.3 before 5.11.6 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle issues in the auto update process. Successful exploitation allows attackers to gain privileges of the root user.

The host is installed with LibreOffice 7.2.x before 7.2.5001 and is prone to an improper certificate validation vulnerability. A flaw is present in the application, which fails to properly handle digital signatures of ODF documents. Successful exploitation allows attackers to create a digitally signed ODF document, by manipulating the documentsignatures.xml or macrosignatures.xml stream within the ...

The host is installed with Inkscape 0.91 and is prone to an access of an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle issues in unspecified vectors. Successful exploitation could allow attackers to gain access of uninitialized pointer.

The host is installed with Inkscape 0.91 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to properly handle issues in unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Inkscape 0.91 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle issues in unspecified vectors. Successful exploitation could allow attackers to gain access to unauthorized information.


Pages:      Start    729    730    731    732    733    734    735    736    737    738    739    740    741    742    ..   1627

© SecPod Technologies