[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15028 Download | Alert*

The host is installed with Serv-U FTP Server before 11.1.0.5 and is prone to directory traversal vulnerability. A flaw is present in the application, which fails to properly validate the given input. Successful exploitation allows remote attackers to disclose potentially sensitive information and manipulate certain data.

The host is installed with zFTPServer Suite 6.0.0.52 and is prone to a directory traversal vulnerability. A flaw is present in the application, which fails to handle a a crafted RMD (aka rmdir) command. Successful exploitation could allow attackers to to delete arbitrary directories.

The host is installed with the VMware Workstation 11.x before 11.1.2 or VMware Player 7.x before 7.1.2 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows Windows guest OS users to gain guest OS privileges or cause a denial of service (guest OS kernel memory corruption).

The host is installed with VMware Workstation 5.5.4, 6.0.2, VMware Player 1.0.4 or 2.0.2 and is prone to a directory traversal vulnerability. A flaw is present in the application, which fails to handle a crafted VMCI calls that trigger memory. Successful exploitation allows attackers to allows guest OS users to read and write arbitrary files on the host OS string that produces a wide character str ...

The host is installed with VMware Workstation 10.x before 10.0.7, 11.x before 11.1.1, VMware Player 6.x before 6.0.7 or 7.x before 7.1.1 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails handle a thread injection, Successful exploitation allows host OS users to gain host OS privileges.

The host is installed with Oracle VM VirtualBox 5.1.x before 5.1.4 and is prone to a privilege escalation vulnerability. A flaw is present in the VirtualBox Remote Desktop Extension (VRDE), which fails to handle unknown vectors. Successful exploitation can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauth ...

The host is installed with Oracle VM VirtualBox 5.0.x before 5.0.28 or 5.1.x before 5.1.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation can result in unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial ...

The host is installed with Oracle VM VirtualBox 5.0.x before 5.0.28 or 5.1.x before 5.1.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox.

The host is installed with Oracle VM VirtualBox 5.0.x before 5.0.28 or 5.1.x before 5.1.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox.

The host is installed with Oracle WebLogic Server component in Oracle Fusion Middleware 12.1.3.0, 12.2.1.0 or 12.2.1.1 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to CIE. Successful exploitation allows remote attackers to affect confidentiality and integrity.


Pages:      Start    1437    1438    1439    1440    1441    1442    1443    1444    1445    1446    1447    1448    1449    1450    ..   1502

© SecPod Technologies