[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14857 Download | Alert*

The host is installed with OpenSSL and is prone to lattice calculation and timing attack vulnerability. A flaw is present in elliptic curve cryptography (ECC) subsystem, which fails to properly implement curves over binary fields. Successful exploitation allow context-dependent attackers to determine private keys.

The host is installed with Winamp before 5.623 and is prone to multiple integer overflow vulnerabilities. The flaws are present in the application, which fail to handle an AVI file with a crafted value for (1) the number of streams or (2) the size of the RIFF INFO chunk. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with RealPlayer before 15.0.4.53 or RealPlayer SP 1.0 through 1.1.5 and is prone to remote code execution vulnerability. A flaw is present in the applications, which fail to properly parse ASMRuleBook data in RealMedia files. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with VMware Workstation 15.x before 15.5.1, VMware Player 15.x before 15.5.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle an issue in vmnetdhcp. Successful exploitation may allow attacker on a guest VM to disclose sensitive information by leaking memory from the host process.

The host is installed with Oracle Java SE 5.0 Update 17 or earlier or 6 Update 12 or earlier and is prone to Multiple unspecified vulnerabilities. A flaw is present in the applications, which fails to properly handle vectors related to temporary font files. Successful exploitation allows remote attackers to cause a denial of service.

The host is installed with OpenAFS before 1.6.24 and is prone to an information disclosure vulnerability. The flaw is present in the application, which fails to handle uninitialized RPC output variables. Successful exploitation allow attackers to access unauthorized information.

The host is installed with OpenAFS before 1.6.24 prone to an information disclosure vulnerability. The flaw is present in the application, which fails to handle uninitialized RPC output variables. Successful exploitation allow attackers to access unauthorized information.

A denial of service vulnerability exists in the way that .NET Core handles specially crafted requests, causing a hash collision. To exploit the vulnerability, an attacker could send a small number of specially crafted requests to an .NET Core web application, causing performance to degrade significantly enough to cause a denial of service condition.

A tampering vulnerability exists when .NET Core improperly handles specially crafted files. An attacker who successfully exploited this vulnerability could write arbitrary files and directories to certain locations on a vulnerable system. However, an attacker would have limited control over the destination of the files and directories. To exploit the vulnerability, an attacker must send a speciall ...

An information disclosure vulnerability exists in .NET Core when authentication information is inadvertently exposed in a redirect. An attacker who successfully exploited this vulnerability could use the information to further compromise the web application. The security update addresses the vulnerability by correcting how .NET Core handles redirects.


Pages:      Start    1341    1342    1343    1344    1345    1346    1347    1348    1349    1350    1351    1352    1353    1354    ..   1485

© SecPod Technologies