[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255716

 
 

909

 
 

198991

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 198106 Download | Alert*

The host is installed with VideoLAN VLC media player before 2.0.7 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle the web interface. Successful exploitation allows remote attackers to view directory listings via the 'dir' command or issue other commands without authenticating.

The host is installed with Oracle Java SE through 6u201, 7u191, 8u181 or 11 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Deployment (libpng). Successful exploitation allows attackers to affect availability..

The host is installed with Oracle Java SE through 7u45 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Hotspot. Successful exploitation allows attackers to affect confidentiality, integrity and availability.

The host is installed with Pidgin 2.10.0 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle DBUS used for certain cleartext communication. Successful exploitation allows attackers to obtain sensitive information via a dbus session monitor.

The host is installed with Pidgin before 2.14.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle the g_markup_escape_text function. Successful exploitation allows remote attackers to cause a denial of service (crash) via invalid UTF-8 sequences that trigger use of invalid pointers and an out-of-bounds read, related to interactions with ...

The host is installed with Jenkins LTS 2.235.x or Jenkins rolling release before 2.236 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle ReadyAPI Functional Testing Plugin. Successful exploitation allows attackers to view passwords stored in job config.xml files with extended read permission.

The host is installed with Xcode before 11.2 on Apple Mac OS X 10.14.4 or later or Git 2.14.x before 2.14.6, 2.15.x before 2.15.4, 2.16.x before 2.16.6, 2.17.x before 2.17.3, 2.18.x before 2.18.2, 2.19.x before 2.19.3, 2.20.x before 2.20.2, 2.21.x before 2.21.1, 2.22.x before 2.22.2, 2.23.x before 2.23.1 or 2.24.x before 2.24.1 and is prone to a security bypass vulnerability. A flaw is present in ...

The host is installed with Cisco Jabber before 12.8.7 or 12.9.x before 12.9.6 and is prone to a denial of service vulnerability. A flaw is present in application, which fails to properly handle improper validation of message content. Successful exploitation could allow an authenticated, remote attacker to cause a DoS condition.

The host is installed with Cisco Jabber before 12.8.7 or 12.9.x before 12.9.6 and is prone to a certificate validation vulnerability. A flaw is present in application, which fails to properly handle improper validation of certificates. Successful exploitation could allow an unauthenticated, remote attacker to intercept protected network traffic.

The host is installed with Wireshark 3.4.0 through 3.4.3 or 3.2.0 through 3.2.11 and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle unsafe URLs. Successful exploitation allows attackers to crash Wireshark by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.


Pages:      Start    8608    8609    8610    8611    8612    8613    8614    8615    8616    8617    8618    8619    8620    8621    ..   19810

© SecPod Technologies