[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249966

 
 

909

 
 

195636

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 1804 Download | Alert*

The host is missing a high severity security update according to Microsoft advisory. The update is required to fix multiple vulnerabilities vulnerability. The flaws are present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is missing an important security update according to advisory VMSA-2020-0005 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle improper use of setuid binaries. Successful exploitation may allow local attackers to escalate their privileges to root on the system where Fusion, VMRC or Horizon Client is installed.

The host is missing a security update according to the Apple advisory and is prone to an improper input validation. A flaw is present in the application, which fails to properly handle handle newline character. Successful exploitation allows an attacker disclose credential information to be provided for the wrong host.

The host is missing a security update according to the Apple advisory APPLE-SA-2020-05-20-1 and is prone to an improper input validation. A flaw is present in the application, which fails to properly handle handle newline character. Successful exploitation allows an attacker disclose credential information to the wrong host.

The host is missing a security update according to Apple advisory, APPLE-SA-2020-11-05-6. The update is required to fix multiple vulnerabilities. A flaw is present in the application, which fails to handle a various issues. Successful exploitation allows attackers to execute arbitrary code with kernel privileges.

The host is missing a critical security update according to advisory VMSA-2020-0026 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to handle an issue in XHCI USB controller. Successful exploitation may allow attackers with local administrative privileges on a virtual machine to execute code as the virtual machine's VMX process running on the host.

The host is missing a low severity security update according to advisory VMSA-2020-0029 and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to handle improper input validation in GuestInfo. Successful exploitation may allow attackers with normal user privilege access to a virtual machine to crash the virtual machine's vmx process leading to a denial ...

The host is missing an important severity security update according to advisory VMSA-2020-0023 and is prone to multiple vulnerabilities. A flaw is present in the application, which fails to handle a time-of-check time-of-use issue in ACPI device. Successful exploitation may allow attackers with to cause multiple impacts.

The host is missing an important severity security update according to advisory VMSA-2020-0023 and is prone to a memory leak vulnerability. A flaw is present in the application, which fails to handle an issue in VMCI host drivers. Successful exploitation may allow attackers with access to a virtual machine to trigger a memory leak issue resulting in memory resource exhaustion on the hypervisor if ...

The host is missing a moderate severity security update according to advisory VMSA-2020-0020 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle system wide path configuration. Successful exploitation may allow attackers with normal user privileges to trick an admin user into executing malicious code on the system where Fusion is instal ...


Pages:      Start    163    164    165    166    167    168    169    170    171    172    173    174    175    176    ..   180

© SecPod Technologies