[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31600 Download | Alert*

The host is installed with Opera Browser before 11.60 and is prone to address spoofing vulnerability. A flaw is present in the application, which fails to properly handle the unspecified homograph characters. Successful exploitation allows remote attackers to spoof the address bar via unspecified homograph characters.

The host is installed with Wireshark 3.4.0 to 3.4.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an issue in USB HID dissector. Successful exploitation allows attackers to crash Wireshark by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.

The host is installed with Wireshark 3.4.0 to 3.4.2 and is prone to a memory leak vulnerability. A flaw is present in the application, which fails to properly handle an issue in USB HID dissector. Successful exploitation allows attackers to leak memory and cause denial of service.

The host is installed with Wireshark 1.8.x before 1.8.2 and is prone to array index error vulnerability. A flaw is present in the application, which fails to properly handle certain integer fields. Successful exploitation allows remote attackers to cause a denial of service (application crash).

The host is installed with Wireshark 1.8.x before 1.8.2 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle certain integer fields. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Oracle VM VirtualBox before 6.1.18 and is prone to an privilege escalation vulnerability. A flaw is present in the application, which fails to handle vectors related to Core. Successful exploitation allows attackers to affect Integrity.

The host is installed with Oracle VM VirtualBox before 6.1.18 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle vectors related to Core. Successful exploitation allows attackers to affect Availability.

The host is installed with Oracle VM VirtualBox before 6.1.18 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle vectors related to Core. Successful exploitation allows attackers to affect Confidentiality and Integrity.

The host is installed with Oracle VM VirtualBox before 6.1.18 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle vectors related to Core. Successful exploitation allows attackers to affect Confidentiality.

The host is installed with Oracle VM VirtualBox before 6.1.18 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle vectors related to Core. Successful exploitation allows attackers to affect Availability.


Pages:      Start    1626    1627    1628    1629    1630    1631    1632    1633    1634    1635    1636    1637    1638    1639    ..   3159

© SecPod Technologies