[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256369

 
 

909

 
 

199183

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15029 Download | Alert*

The host is installed with Opera before 11.01 and is prone to CSS bypass vulnerability. A flaw is present in the implementation of Cascading Style Sheets (CSS) extensions for XML which recognizes links to javascript: URLs in the -o-link property. Successful exploitation allows remote attackers to bypass CSS filtering via a crafted URL.

The host is installed with Google Chrome before 10.0.648.204 and is prone to denial of service vulnerability. A flaw is present in the application which does not properly handle parentage. Successful exploitation allow remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.

The host is installed with VMware Workstation 15.x before 15.5.2, VMware Player 15.x before 15.5.2 and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to handle Shader functionality. Successful exploitation may allow attackers with non-administrative access to a virtual machine to crash the virtual machine's vmx process leading to a denial of servic ...

The host is installed with VMware Workstation 15.x before 15.1.0, VMware Player 15.x before 15.1.0 and is prone to a memory leak vulnerability. A flaw is present in the application, which fails to handle VMCI module. Successful exploitation may allow attackers with local non-administrative access to a virtual machine may be able to crash the virtual machine's vmx process leading to a partial denia ...

The host is installed with IBM DB2 9.7 before FP2 and is prone to security vulnerability. A flaw is present in the SYSIBMADM schema in the application which does not perform the expected access control on the monitor administrative views. Successful exploitation allow remote attackers can obtain sensitive information via unspecified vectors.

The host is installed with IBM DB2 9.7 before FP2 and is prone to denial of service vulnerability. A flaw is present in AUTO_REVAL database configuration parameter in the application which fails to handle an error during special group and user enumeration. Successful exploitation allows an attacker could rap the server and cause a denial of service.

The host is installed with IBM DB2 9.1 before FP9 or 9.5 before FP6 or 9.7 before FP2 and is prone to denial of service vulnerability. A flaw is present in the application which fails to handle an error during special group and user enumeration. Successful exploitation allows an attacker could rap the server and cause a denial of service.

The host is installed with VMware Workstation 15.x before 15.5.5, VMware Player 15.x before 15.5.5 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle NVMe functionality. Successful exploitation may allow attackers with local non-administrative access to a virtual machine with a virtual NVMe controller present may be able to rea ...

The host is installed with MariaDB 10.4.7 through 10.4.11 and is prone to an improper privilege management vulnerability. A flaw is present in the application which fails to properly handle auth_pam_tool_dir/auth_pam_tool component. Successful exploitation allows privilege escalation from the mysql user account to root because chown and chmod are performed unsafely.

The host is installed with IBM DB2 9.1 before FP9 or 9.5 before FP6 or 9.7 before FP2 and is prone to Privilege escalation vulnerability. A flaw is present in the DB2DART tool in the application which fails to avoid unspecified error in the DB2DART tool. Successful exploitation allows an attacker could overwrite arbitrary files owned by the DB2 instance owner.


Pages:      Start    1043    1044    1045    1046    1047    1048    1049    1050    1051    1052    1053    1054    1055    1056    ..   1502

© SecPod Technologies