[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255227

 
 

909

 
 

198741

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 197856 Download | Alert*

The host is installed with Wireshark 3.6.x before 3.6.14 or 4.0.x before 4.0.6 and is prone to a heap buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle the issue in validation. Successful exploitation allows attackers to execute code in the context of the process running Wireshark.

The host is installed with Wireshark 3.6.x before 3.6.14 or 4.0.x before 4.0.6 and is prone to a heap buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle the issue in validation. Successful exploitation allows attackers to execute code in the context of the process running Wireshark.

Wireshark allows you to examine protocol data stored in files or as it is captured from wired or wireless networks, USB devices, and many other sources. It supports dozens of protocol capture file formats and understands more than a thousand protocols. It has many powerful features including a rich display filter language and the ability to reassemble multiple protocol packets in order to, for ex ...

Wireshark allows you to examine protocol data stored in files or as it is captured from wired or wireless networks, USB devices, and many other sources. It supports dozens of protocol capture file formats and understands more than a thousand protocols. It has many powerful features including a rich display filter language and the ability to reassemble multiple protocol packets in order to, for ex ...

Wireshark allows you to examine protocol data stored in files or as it is captured from wired or wireless networks, USB devices, and many other sources. It supports dozens of protocol capture file formats and understands more than a thousand protocols. It has many powerful features including a rich display filter language and the ability to reassemble multiple protocol packets in order to, for ex ...

Qt is a software toolkit for developing applications. This package contains base tools, like string, xml, and network handling.

Qt is a software toolkit for developing applications. This package contains base tools, like string, xml, and network handling.

Qt is a software toolkit for developing applications. This package contains base tools, like string, xml, and network handling.

When using the Qt SQL ODBC driver plugin, then it is possible to trigger a DOS with a specifically crafted stringRESERVEDNOTE: https://www.qt.io/blog/security-advisory-qt-sql-odbc-driver-pluginNOTE: https://github.com/qt/qtbase/commit/aaf1381eab6292aa0444a5eadcc24165b6e1c02d NOTE: https://download.qt.io/official_releases/qt/5.15/CVE-2023-24607-qtbase-5.15.diff

QT-based clients may mismatch HSTS headers , which would prevent the client from switching to a secure HTTPS connection as requested by a server


Pages:      Start    7716    7717    7718    7719    7720    7721    7722    7723    7724    7725    7726    7727    7728    7729    ..   19785

© SecPod Technologies