[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15028 Download | Alert*

The host is installed with VMware Workstation 9.x before 9.0.3 or VMware Player 5.x before 5.0.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle an application that performs a crafted memory allocation. Successful exploitation allows guest OS users to gain guest OS privileges.

The host is installed with VMware Workstation before 10.0.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle files from vm-support archive. Successful exploitation allows local users to obtain sensitive information by extracting files from this archive.

The host is installed with VMware Workstation 10.x before 10.0.5 or VMware Player 6.x before 6.0.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a configuration file. Successful exploitation allow host OS users to gain host OS privileges or cause a denial of service (arbitrary write to a file).

The host is installed with the VMware Workstation 12.x before 12.5.0 or VMware Player 12.x before 12.5.0 and is prone to an insecure executable loading vulnerability. A flaw is present in the application, which improperly load DLL files. Successful exploitation allows attacker to execute an exe file placed in the same directory as installer with the name "setup64.exe" or could execute arbitrary co ...

The host is installed with 3S CoDeSys 3.0 before 3.5 or before 2.3.9.32 and is prone to directory traversal vulnerability. A flaw is present in the application, which fails to handle a specially-crafted HTTP GET request. Successful exploitation allows remote attackers to traverse directories on the system, to create arbitrary directories under the web root.

The host is installed with 360zip 1.93beta and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation allows remote attackers to execute arbitrary code via vectors related to file browsing and file extraction.

The host is installed with IBM DB2 9.5 before FP9 and is prone to insecure file-permissions vulnerability. A flaw is present in the application, which uses world-writable permissions for nodes.reg. Successful exploitation has unspecified impact and attack vectors.

A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server. The attacker who successfully exploited the vulnerability could then perform cross-site scrip ...

A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server. The attacker who successfully exploited the vulnerability could then perform cross-site scrip ...

A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server. The attacker who successfully exploited the vulnerability could then perform cross-site scrip ...


Pages:      Start    1386    1387    1388    1389    1390    1391    1392    1393    1394    1395    1396    1397    1398    1399    ..   1502

© SecPod Technologies