[Forgot Password]
Login  Register Subscribe

25354

 
 

132811

 
 

146396

 
 

909

 
 

117043

 
 

156

 
 
Paid content will be excluded from the download.

Filter
Matches : 14732 Download | Alert*

The host is installed with VMware Workstation 15.x before 15.5.5 or VMware Player 15.x before 15.5.5 and is prone to an off-by-one heap-overflow vulnerability. A flaw is present in the application, which fails to properly handle SVGA device. Successful exploitation may allow attackers with local access to a virtual machine with 3D graphics enabled may be able to exploit this vulnerability to execu ...

The host is installed with VMware Workstation 15.x before 15.5.5 or VMware Player 15.x before 15.5.5 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle Shader Functionality. Successful exploitation may allow attackers with non-administrative local access to a virtual machine with 3D graphics enabled may be able to exploit this ...

The host is installed with VMware Workstation 15.x before 15.5.2 or VMware Player 15.x before 15.5.2 and is prone to a heap-overflow vulnerability due to race condition. A flaw is present in the application, which fails to properly handle EHCI controller. Successful exploitation may allow attackers with local access to a virtual machine may be able to exploit this vulnerability to execute code on ...

The host is installed with VMware Workstation 15.x before 15.5.5 or VMware Player 15.x before 15.5.5 and is prone to a heap-overflow vulnerability. A flaw is present in the application, which fails to properly handle EHCI controller. Successful exploitation may allow attackers with local access to a virtual machine may be able to exploit this vulnerability to execute code on the hypervisor from a ...

The host is installed with VMware Workstation 15.x before 15.5.5 or VMware Player 15.x before 15.5.5 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to properly handle XHCI controller. Successful exploitation may allow attackers with local administrative privileges on a virtual machine to crash the virtual machine's vmx process leading to a d ...

The host is installed with VMware Workstation 15.x before 15.5.5 or VMware Player 15.x before 15.5.5 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to properly handle SVGA device. Successful exploitation may allow attackers with local access to execute code on the hypervisor from a virtual machine.

The host is installed with Artifex Ghostscript before 9.24 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which uses incorrect restoration of privilege checking during handling of invalid access exceptions. Successful exploitation could allow attackers to supply crafted postScript files to crash the interpreter or potentially execute code.

The host is installed with Nvidia graphics driver with 450.x prior to 451.48 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape". Successful exploitation may allow attackers with local access to cause denial of service or potential escalation of privileges.

The host is installed with Nvidia graphics driver with 450.x prior to 451.48 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a DirectX 11 user mode driver "nvwgf2um/x.dll". Successful exploitation may allow attackers with local access to cause out of bounds access, leading to denial of service.

The host is installed with Nvidia graphics driver with 450.x prior to 451.48 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a service host component where application resources integrity check may be missed. Successful exploitation may allow attackers with local access to cause code execution, denial of service or infor ...


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1473

© SecPod Technologies