[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256488

 
 

909

 
 

199193

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26839 Download | Alert*

Host is installed with Kaspersky Anti-Virus 2019 before Patch I and Patch J or Kaspersky Anti-Virus 2020 before Patch E and Patch F and is prone to an open redirect vulnerability. A flaw is present in the application, which fails to properly handle the web protection component due to a bug in its implementation. Successful exploitation allows an attacker to redirect to an untrusted site since the ...

The host is installed with VMware Workstation 15.x before 15.5.7 or VMware Player 15.x before 15.5.7 and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to handle improper input validation in GuestInfo. Successful exploitation may allow an attacker with normal user privilege access to a virtual machine to crash the virtual machine's vmx process lead ...

The host is installed with the VMware Workstation 14.x before 14.1.2 or VMware Player 14.x before 14.1.2 and may suffer from multiple denial-of-service vulnerabilities. The application fails to properly handle remote procedure calls through the RPC handler. Successful exploitation of these issues may allow an attacker with limited privileges on the guest machine trigger a denial-of-service of thei ...

The host is installed with Wireshark 2.0.x or 2.2.x with USPBcap component 1.1.0.0 and is prone to a local privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle the USPBcap component issue. Successful exploitation allows attackers to gain elevated privileges.

The host is installed with Nvidia graphics driver with 470.x prior to 472.39 or 495.x prior to 496.49 and is prone to a NULL pointer dereference validation vulnerability. A flaw is present in the application which fails to properly handle the kernel mode layer. Successful exploitation may lead to denial of service in the form of a system crash.

The host is installed with Nvidia graphics driver with 470.x prior to 472.39 or 495.x prior to 496.49 and is prone to a NULL pointer dereference vulnerability. A flaw is present in the application which fails to properly handle the kernel mode layer. Successful exploitation may lead to denial of service in a component beyond the vulnerable component.

The host is installed with Nvidia graphics driver with 470.x prior to 471.41 and is prone to a NULL pointer dereference vulnerability. A flaw is present in the application which fails to properly handle the kernel mode layer. Successful exploitation may lead to a system crash.

The host is installed with Nvidia graphics driver with 460.x prior to 462.31 or 465.x prior to 466.11 and is prone to a NULL pointer dereference vulnerability. A flaw is present in the application which fails to properly handle the kernel driver. Successful exploitation may lead to system crash.

The host is installed with Microsoft Windows Server 2003 SP2, Vista SP2, Server 2008 SP2, Windows 7 SP1, Server 2008 R2 SP1, Windows 8, Windows 8.1, Server 2012 or Server 2012 R2 and is prone to a Win32k null pointer dereference vulnerability. A flaw is present in the application, which fails to properly validate data passed from user mode. Successful exploitation allows remote attackers to execut ...


Pages:      Start    2674    2675    2676    2677    2678    2679    2680    2681    2682    2683    ..   2683

© SecPod Technologies