[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14857 Download | Alert*

The host is installed with KMPlayer through 2018.12.24.14 and is prone to an out-of-bounds read/write vulnerability. A flaw is present in the application, which fails to an object size which leads to integer overflow. Successful exploitation could allow attackers to cause out-of-bounds read/write vulnerability.

An information disclosure vulnerability exists in Microsoft SQL Server Management Studio when it improperly enforces permissions. An attacker could exploit the vulnerability if the attacker's credentials allow access to an affected SQL server database. An attacker who successfully exploited the vulnerability could gain additional database and file information.

An information disclosure vulnerability exists in Microsoft SQL Server Management Studio when it improperly enforces permissions. An attacker could exploit the vulnerability if the attacker's credentials allow access to an affected SQL server database. An attacker who successfully exploited the vulnerability could gain additional database and file information.

The host is installed with VMware Workstation 6.0.2 or VMware Player 2.0.x before 2.0.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle VIX API calls. Successful exploitation allows remote attackers to have unknown impact and attack vectors.

The host is installed with Opera before 11.0 and is prone to an unspecified vulnerability. A flaw is present in the application. Specific details regarding the vulnerability have not been made public. Successful exploitation could allow an attacker to produce unknown impacts.

The host is installed with Oracle Java SE 5.0 Update 17 or earlier or 6 Update 12 or earlier and is prone to integer signedness error vulnerability. A flaw is present in the applications, which fails to properly handle crafted glyph descriptions in a Type1 font. Successful exploitation allows remote attackers to access files or execute arbitrary code.

The host is installed with Oracle Java SE 5 Update 17 or earlier, 6 Update 12 or earlier, 1.3.1_24 or earlier or 1.4.2_19 or earlier and is prone to unspecified vulnerability. A flaw is present in the applications, which fails to properly handle unknown vectors related to "deserializing applets". Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Oracle Java SE 5 Update 17 or earlier, 6 Update 12 or earlier or 1.4.2_19 or earlier and is prone to cross-site scripting vulnerability. A flaw is present in the applications, which fails to properly handle unknown vectors related to LiveConnect. Successful exploitation allows user-assisted attackers to bypass intended access restrictions.

The host is installed with Oracle Java SE 5 Update 17 or earlier or 6 Update 12 or earlier and is prone to swing jlabel HTML parsing vulnerability. A flaw is present in the applications, which fails to properly handle unknown vectors. Successful exploitation allows user-assisted attackers to bypass intended access restrictions.

The host is installed with Oracle Java SE 6 Update 12, 11 or 10 and is prone to unspecified vulnerability. A flaw is present in the applications, which does not properly handle unknown vectors. Successful exploitation allows remote attackers to bypass intended access restrictions and connect to arbitrary sites.


Pages:      Start    1402    1403    1404    1405    1406    1407    1408    1409    1410    1411    1412    1413    1414    1415    ..   1485

© SecPod Technologies