[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256040

 
 

909

 
 

199103

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 8286 Download | Alert*

The host is installed with Wireshark 2.0.x before 2.0.8 or 2.2.x before 2.2.2 and is prone to an use-after-free vulnerability. A flaw is present in the DCERPC dissector, which fails to properly handle network traffic or a capture file. Successful exploitation allow attackers to crash the service with a use-after-free.

The host is installed with Wireshark 2.2.x before 2.2.2 and is prone to an unspecified vulnerability. A flaw is present in the I/O dissector, which fails to properly handle network traffic or a capture file. Successful exploitation allows attackers to cause unspecified impact.

The host is installed with Wireshark 2.2.x before 2.2.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle NCP dissector. Successful exploitation allows attackers to crash the service by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.

The host is installed with Wireshark 2.2.x before 2.2.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle bluetooth L2CAP dissector. Successful exploitation allows attackers to crash the service by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.

The host is installed with Excel for Mac 2011 or Office 2016 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could run arbitrary code in the context of the current user.

The host is installed with Word for Mac 2011 or Office 2016 for Mac and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could run arbitrary code in the context of the current user.

The host is installed with Word for Mac 2011 for Mac and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could run arbitrary code in the context of the current user.

The host is installed with Microsoft Excel 2016 for Mac and is prone to a security feature update vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could run arbitrary code in the context of the current user.

The host is installed with Word for Mac 2011 or Office 2016 for Mac and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could run arbitrary code in the context of the current user.

The host is installed with Word for Mac 2011 or Office 2016 for Mac and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could run arbitrary code in the context of the current user.


Pages:      Start    730    731    732    733    734    735    736    737    738    739    740    741    742    743    ..   828

© SecPod Technologies