[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249966

 
 

909

 
 

195636

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14858 Download | Alert*

The host is installed with Oracle WebLogic Server component in Oracle Fusion Middleware 12.1.3.0, 12.2.1.0 or 12.2.1.1 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to CIE. Successful exploitation allows remote attackers to affect confidentiality and integrity.

The host is installed with Apache CouchDB before 1.0.4, 1.1.x before 1.1.2 or 1.2.x before 1.2.1 and is prone to a directory traversal vulnerability. A flaw is present in the application, which fails to handle the partition2 function in mochiweb_util.erl. Successful exploitation could allow remote attackers to read arbitrary files via a ..\ (dot dot backslash) in the default URI.

The host is installed with Microsys Promotic before 8.1.5 and is prone to a directory traversal vulnerability. A flaw is present in the application, which fails to handle a crafted application. Successful exploitation could allow attackers to read arbitrary file.

The host is installed with Apache Subversion 1.8.0 before 1.8.2 and is prone to a FSFS repository corruption vulnerability. A flaw is present in the application, which fails to proper edit revision properties. Successful exploitation could allow wrong file to get deleted.

The host is installed with Microsoft Windows Server 2008 R2, Windows Vista, Windows 7, Server 2012, Server 2012 R2, Windows 8 or Windows 8.1 and is prone to a directory traversal elevation of privilege vulnerability. A flaw is present in the TS WebProxy Windows component, which fails to properly sanitize file paths. Successful exploitation could allow attackers to gain the same user rights as the ...

The host is installed with Microsoft SharePoint Foundation 2010 and is prone toelevation of privilege vulnerability. A flaw is present in the application, which fails to properly validate user input. Successful exploitation allows attackers to read unauthorized content.

The host is installed with VMware Workstation 6.0.x before 6.0.3 or VMware Player 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted VMCI calls that trigger memory. Successful exploitation allows attackers to cause a denial of service (host OS crash).

The host is installed with VMware Workstation 5.5.x before 5.5.6 or VMware Player 1.0.x before 1.0.6 and is prone to a denial of service vulnerability. A flaw is present in the DHCP service, which fails to handle unspecified vectors. Successful exploitation allows remote attackers to cause denial of service.

The host is installed with VMware Workstation 6.x before 6.0.6, 5.x before 5.5.9, VMware Player 2.0.x through 2.0.5 or 1.0.x through 1.0.8 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle a virtual hardware request that triggers an arbitrary physical-memory write operation. Successful exploitation allows guest OS users to an arbitrary physic ...

The host is installed with VMware Workstation 10.x before 10.0.6, 11.x before 11.1.1, VMware Player 6.x before 6.0.6 or 7.x before 7.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors, Successful exploitation allows guest OS users to execute arbitrary code on the host OS.


Pages:      Start    1440    1441    1442    1443    1444    1445    1446    1447    1448    1449    1450    1451    1452    1453    ..   1485

© SecPod Technologies