[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255227

 
 

909

 
 

198741

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 27013 Download | Alert*

The host is installed with Visual Studio or .NET Core products and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause denial of service attacks.

The host is installed with Oracle VM VirtualBox before 6.1.20 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Core. Successful exploitation allows attackers to affect Confidentiality.

The host is installed with LibreOffice 7.2.x before 7.2.5 and is prone to an improper certificate validation vulnerability. A flaw is present in the application, which fails to properly handle digital signatures of ODF documents. Successful exploitation allows attackers to create a digitally signed ODF document, by manipulating the documentsignatures.xml or macrosignatures.xml stream within the do ...

The host is installed with Apache OpenOffice before 4.1.13 and is prone to an inadequate encryption strength vulnerability. A flaw is present in the application, which fails to properly handle issues in master key which was poorly encoded resulting in weakening its entropy from 128 to 43 bits making the stored passwords. Successful exploitation could allow attackers to gain access to the users sto ...

The host is installed with Apache OpenOffice before 4.1.13 and is prone to an inadequate encryption strength vulnerability. A flaw is present in the application, which fails to properly handle issues in master key which was poorly encoded resulting in weakening its entropy from 128 to 43 bits making the stored passwords. Successful exploitation could allow attackers to gain access to the users sto ...

The host is installed with Apache OpenOffice before 4.1.13 and is prone to an inadequate encryption strength vulnerability. A flaw is present in the application, which fails to properly handle the issues in encryption of initialization vector. Successful exploitation could allow attackers to gain access to the user's configuration data.

The host is installed with Apache OpenOffice before 4.1.13 and is prone to an inadequate encryption strength vulnerability. A flaw is present in the application, which fails to properly handle the issues in encryption of initialization vector. Successful exploitation could allow attackers to gain access to the user's configuration data.

The host is installed with Oracle VM VirtualBox before 6.1.36 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Core. Successful exploitation allows attackers to affect Confidentiality.

The host is installed with Oracle VM VirtualBox before 6.1.36 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Core. Successful exploitation allows attackers to affect Confidentiality.

The host is installed with Wireshark 3.4.0 before 3.4.10 or 3.2.0 before 3.2.18 and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle large loop issue in the PNRP dissector. On Successful exploitation,it is possible to make Wireshark consume excessive CPU resources by injecting a malformed packet onto the wire or by convincing someo ...


Pages:      Start    1355    1356    1357    1358    1359    1360    1361    1362    1363    1364    1365    1366    1367    1368    ..   2701

© SecPod Technologies