[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250363

 
 

909

 
 

196124

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15162 Download | Alert*

The host is installed with Oracle VM VirtualBox 5.0.x before 5.0.28 or 5.1.x before 5.1.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox.

The host is installed with Oracle VM VirtualBox 5.0.x before 5.0.28 or 5.1.x before 5.1.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox.

The host is installed with Oracle WebLogic Server component in Oracle Fusion Middleware 12.1.3.0, 12.2.1.0 or 12.2.1.1 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to CIE. Successful exploitation allows remote attackers to affect confidentiality and integrity.

The host is installed with Siemens Automation License Manager (ALM) 2.0 through 5.1+SP1+Upd2 and is prone to absolute path traversal vulnerability. A flaw is present in the application, which fails to properly handle ActiveX control in almaxcx.dll in the graphical user interface. Successful exploitation allows remote attackers to overwrite arbitrary files via the Save method.

The host is installed with WellinTech KingView 6.53 and is prone to directory traversal vulnerability. A flaw is present in the application, which fails to properly handle a crafted HTTP request. Successful exploitation allows remote attackers to read arbitrary files.

The host is installed with AWStats and is prone to directory traversal vulnerability. A flaw is present in the application, which fails to validate input. Successful exploitation could allow remote attackers to to have an unspecified impact via a crafted LoadPlugin directory.

The host is installed with Microsys Promotic before 8.1.5 and is prone to a directory traversal vulnerability. A flaw is present in the application, which fails to handle a crafted application. Successful exploitation could allow attackers to read arbitrary file.

The host is installed with Apache Subversion 1.8.0 before 1.8.2 and is prone to a FSFS repository corruption vulnerability. A flaw is present in the application, which fails to proper edit revision properties. Successful exploitation could allow wrong file to get deleted.

The host is installed with Microsoft Windows Server 2008 R2, Windows Vista, Windows 7, Server 2012, Server 2012 R2, Windows 8 or Windows 8.1 and is prone to a directory traversal elevation of privilege vulnerability. A flaw is present in the TS WebProxy Windows component, which fails to properly sanitize file paths. Successful exploitation could allow attackers to gain the same user rights as the ...

The host is installed with Sybase EAServer 6.3.1 Developer Edition and is prone to a directory traversal vulnerability. A flaw is present in the application, which fails to handle a particular sequence in a path. Successful exploitation could allow attackers to traverse directories and read arbitrary files.


Pages:      Start    1459    1460    1461    1462    1463    1464    1465    1466    1467    1468    1469    1470    1471    1472    ..   1516

© SecPod Technologies