[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26884 Download | Alert*

The host is installed with the VMware Workstation 12.x before 12.5.0 or VMware Player 12.x before 12.5.0 and is prone to an insecure executable loading vulnerability. A flaw is present in the application, which improperly load DLL files. Successful exploitation allows attacker to execute an exe file placed in the same directory as installer with the name "setup64.exe" or could execute arbitrary co ...

The host is installed with Microsoft Windows Vista SP2, Server 2008 SP2, Windows 7 SP1 or Server 2008 R2 SP1 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to properly handle Windows Kernel API. An attacker who successfully exploited the vulnerabilities could gain access to information that is not intended for the user.

The host is installed with 360zip 1.93beta and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation allows remote attackers to execute arbitrary code via vectors related to file browsing and file extraction.

The host is installed with IBM DB2 9.5 before FP9 and is prone to insecure file-permissions vulnerability. A flaw is present in the application, which uses world-writable permissions for nodes.reg. Successful exploitation has unspecified impact and attack vectors.

The host is installed with RealNetworks Helix Server or Helix Server or Helix Mobile Server 14.x before 14.3.x and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle connection to the SNMP master agent process on TCP port 705. Successful exploitation allows remote attackers to establish and then immediately close a connection to the SN ...

The host is installed with WSO2 API Manager 2.6.0 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle an issue in file upload component. Successful exploitation could allow attackers to upload any type of file by changing the extension to an allowed one.

An information disclosure vulnerability exists in Microsoft SharePoint when an attacker uploads a specially crafted file to the SharePoint Server. An authenticated attacker who successfully exploited this vulnerability could potentially leverage SharePoint functionality to obtain SMB hashes. The security update addresses the vulnerability by correcting how SharePoint checks file content.

An information disclosure vulnerability exists in SharePoint Server. An attacker who exploited this vulnerability could read arbitrary files on the server. To exploit the vulnerability, an attacker would need to send a specially crafted request to a susceptible SharePoint Server instance.

The host is installed with Nvidia graphics driver with 460.x prior to 461.09 and is prone to a denial of service vulnerability. A flaw is present in the kernel mode layer (nvlddmkm.sys) handler, which fails to properly handle unknown vector. Successful exploitation may allow attackers to cause denial of service.

The host is installed with VMware Workstation 15.x before 15.5.0, VMware Player 15.x before 15.5.0 and is prone to denial-of-service vulnerability vulnerability. An attacker may exploit this issue by sending a specially crafted IPv6 packet from a guest machine on the VMware NAT to disallow network access for all guest machines using VMware NAT mode.


Pages:      Start    2602    2603    2604    2605    2606    2607    2608    2609    2610    2611    2612    2613    2614    2615    ..   2688

© SecPod Technologies