[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256148

 
 

909

 
 

199106

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26521 Download | Alert*

The host is installed with Node.js 14.x before 14.21.3, 16.x before 16.19.1, 18.x before 18.14.1, or 19.x before 19.6.1 and is prone to a privilege escalation vulnerability. A flaw is present in the application which fails to handle the experimental permissions option with --experimental-policy. Successful exploitation allows an attacker to bypass the experimental permissions feature and access no ...

The host is installed with Node.js 16.x before 16.19.1, 18.x before 18.14.1, or 19.x before 19.2.0 and is prone to a denial of service vulnerability. A flaw is present in the application which fails to handle an issue in the nodejs crypto library. Successful exploitation allows an attacker to cause false positive errors during subsequent cryptographic operations that happen to be on the same threa ...

The host is installed with Node.js 14.x before 14.21.3, 16.x before 16.19.1, 18.x before 18.14.1, or 19.x before 19.6.1 and is prone to an untrusted search path vulnerability. A flaw is present in the application which fails to handle an insecure loading of ICU data through ICU_DATA environment variable. Successful exploitation allows an attacker to search and potentially and load icu data when ru ...

The host is installed with Node.js 16.x before 16.20.1, 18.x before 18.16.1, or 20.x before 20.3.1 and is prone to an HTTP request smuggling vulnerability. A flaw is present in the application which fails to handle the llhttp parser in the http module. Successful exploitation allows an attacker to cause an HTTP request smuggling (HRS) via empty headers separated by CR.

The host is installed with Wireshark 3.6.x before 3.6.19 or 4.0.x before 4.0.11 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle issues in NetScreen file parser. Successful exploitation allows attackers to injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.

The host is installed with Wireshark 4.0.x before 4.0.11 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle issues in SSH dissector. Successful exploitation allows attackers to make Wireshark crash or consume excessive CPU resources by injecting a malformed packet onto the wire or by convincing someone to read a malformed packe ...

The host is installed with Wireshark 3.6.x before 3.6.20, 4.0.x before 4.0.12 or 4.2.x before 4.2.1and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the IEEE 1609.2 dissector. Successful exploitation allows atackers to crash wireshark by injecting a malformed packet onto the wire or by convincing someone to read a malformed pack ...

The host is installed with Oracle Java SE through 17.0.9 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Security. Successful exploitation allows attackers to affect Integrity.

The host is installed with Apache 9.0.0-M11 through 9.0.43, or 8.5.7 through 8.5.63 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle incomplete POST requests triggered an error response that could contain data from a previous request from another user. Successful exploitation could lead to information diclosure.

Thunderbird versions prior to 91.3.0 are vulnerable to the heap overflow described in CVE-2021-43527 when processing S/MIME messages. Thunderbird versions 91.3.0 and later will not call the vulnerable code when processing S/MIME messages that contain certificates with DER-encoded DSA or RSA-PSS signatures.


Pages:      Start    1048    1049    1050    1051    1052    1053    1054    1055    1056    1057    1058    1059    1060    1061    ..   2652

© SecPod Technologies