[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255716

 
 

909

 
 

198991

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 16276 Download | Alert*

The host is installed with VMware Fusion 12.x before 12.2.1 and is prone to a double-fetch vulnerability. A flaw is present in the application, which fails to handle an issue in the UHCI USB controller. Successful exploitation allows attackers with local administrative privileges on a virtual machine to exploit this issue to execute code as the virtual machine's VMX process running on the host.

The host is installed with VMware Fusion 12.x before 12.2.1 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to handle an issue in the XHCI USB controller. Successful exploitation allows attackers with local administrative privileges on a virtual machine to exploit this issue to execute code as the virtual machine's VMX process running on the host.

The host is installed with Wireshark 3.4.0 before 3.4.10 or 3.2.0 before 3.2.18 and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle large loop issue in the PNRP dissector. On Successful exploitation,it is possible to make Wireshark consume excessive CPU resources by injecting a malformed packet onto the wire or by convincing someo ...

The host is installed with Oracle VM VirtualBox before 6.1.32 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Core. Successful exploitation allows attackers to affect Confidentiality.

The host is installed with VMware Fusion 12.x before 12.2.0 and is prone to a heap-overflow vulnerability. A flaw is present in the application, which fails to handle an issue in the CD-ROM device emulation. Successful exploitation allows attackers with access to a virtual machine with CD-ROM device emulation to exploit this vulnerability in conjunction with other issues to execute code on the hyp ...

The host is installed with Wireshark 3.4.0 before 3.4.11 or 3.6.0 before 3.6.1 and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle the Sysdig Event dissector crash issue. Successful exploitation could allow attackers to make Wireshark crash by injecting a malformed packet onto the wire or by convincing someone to read a malformed ...

The host is installed with Wireshark 3.4.0 before 3.4.11 or 3.6.0 before 3.6.1 and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle the RFC 7468 file parser infinite loop issue. Successful exploitation could allow attackers to make Wireshark consume excessive CPU resources by convincing someone to read a malformed packet trace file ...

The host is installed with Wireshark 3.6.0 before 3.6.1 and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle the pcapng file parser crash issue. Successful exploitation could allow attackers to make Wireshark crash by convincing someone to read a malformed packet trace file.

The host is installed with Wireshark 3.4.0 before 3.4.11 or 3.6.0 before 3.6.1 and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle the BitTorrent DHT dissector crash issue. Successful exploitation could allow attackers to make Wireshark crash by injecting a malformed packet onto the wire or by convincing someone to read a malforme ...

The host is installed with Wireshark 3.4.0 before 3.4.11 and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle the Gryphon dissector crash issue. Successful exploitation could allow attackers to make Wireshark crash by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.


Pages:      Start    736    737    738    739    740    741    742    743    744    745    746    747    748    749    ..   1627

© SecPod Technologies