[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

254802

 
 

909

 
 

198617

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26800 Download | Alert*

The host is installed with VMware Workstation 10.x before 10.0.6, 11.x before 11.1.1, VMware Player 6.x before 6.0.6 or 7.x before 7.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows guest OS users to execute arbitrary code on the host OS.

The host is installed with VMware Workstation 10.x before 10.0.6, 11.x before 11.1.1, VMware Player 6.x before 6.0.6 or 7.x before 7.1.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unspecified vectors, Successful exploitation allows guest OS users to cause a host OS denial of service.

The host is installed with VMware Workstation 10.x before 10.0.6, 11.x before 11.1.1, VMware Player 6.x before 6.0.6 or 7.x before 7.1.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unspecified vectors, Successful exploitation allows guest OS users to cause a host OS denial of service.

The host is installed with VMware Workstation 10.x before 10.0.6, 11.x before 11.1.1, VMware Player 6.x before 6.0.6 or 7.x before 7.1.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows guest OS users to cause a host OS denial of service.

The host is installed with MySQL 5.5.8 and is prone to denial of service vulnerability. A flaw is present in the application, which is caused by a NULL pointer dereference error in the server. Successful exploitation allows remote attacker to crash the database via a crafted packet to TCP port 3306.

The host is installed with 3S CoDeSys 3.0 before 3.5 or before 2.3.9.32 and is prone to integer overflow vulnerability. A flaw is present in the application, which fails to handle a large size value in the packet header. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with ACDSee 14.1 Build 137 and is prone to a integer overflow vulnerability. A flaw is present in the IDE_ACDStd.apl module, which fails to handle a crafted "image dimension values" in a BMP file. Successful exploitation could allow attackers to produce a heap-based buffer overflow.

Buffer overflow in Microsoft SQL Server 2005 SP1 and SP2, and 2005 Express Edition SP1 and SP2, allows remote authenticated users to execute arbitrary code via a crafted insert statement.

Integer underflow in SQL Server 7.0 SP4, 2000 SP4, 2005 SP1 and SP2, 2000 Desktop Engine (MSDE 2000) SP4, 2005 Express Edition SP1 and SP2, and 2000 Desktop Engine (WMSDE); Microsoft Data Engine (MSDE) 1.0 SP4; and Internal Database (WYukon) SP2 allows remote authenticated users to execute arbitrary code via a (1) SMB or (2) WebDAV pathname for an on-disk file (aka stored backup file) with a craft ...

PUBCONV.DLL in Microsoft Office Publisher 2007 does not properly clear memory when transferring data from disk to memory, which allows user-assisted remote attackers to execute arbitrary code via a malformed .pub page via a certain negative value, which bypasses a sanitization procedure that initializes critical pointers to NULL, aka the "Publisher Invalid Memory Reference Vulnerability".


Pages:      Start    2620    2621    2622    2623    2624    2625    2626    2627    2628    2629    2630    2631    2632    2633    ..   2679

© SecPod Technologies