[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256488

 
 

909

 
 

199193

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26532 Download | Alert*

The ByteCode Verifier component of Microsoft Virtual Machine (VM) build 5.0.3809 and earlier, as used in Windows and Internet Explorer, allows remote attackers to bypass security checks and execute arbitrary code via a malicious Java applet, aka "Flaw in Microsoft VM Could Enable System Compromise."

Two vulnerabilities in Microsoft Virtual Machine (VM) up to and including build 5.0.3805, as used in Internet Explorer and other applications, allow remote attackers to read files via a Java applet with a spoofed location in the CODEBASE parameter in the APPLET tag, possibly due to a parsing error.

The host is installed with Microsoft Service Bus for Windows Server and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle incoming AMQP messages. Successful exploitation could allow attackers to crash the service.

Host is installed with Kaspersky Anti-Virus 2019 before Patch I and Patch J or Kaspersky Anti-Virus 2020 before Patch E and Patch F and is prone to an open redirect vulnerability. A flaw is present in the application, which fails to properly handle the web protection component due to a bug in its implementation. Successful exploitation allows an attacker to redirect to an untrusted site since the ...

The host is installed with VMware Workstation 15.x before 15.5.7 or VMware Player 15.x before 15.5.7 and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to handle improper input validation in GuestInfo. Successful exploitation may allow an attacker with normal user privilege access to a virtual machine to crash the virtual machine's vmx process lead ...

The host is installed with Nvidia graphics driver with 470.x prior to 472.39 or 495.x prior to 496.49 and is prone to a NULL pointer dereference validation vulnerability. A flaw is present in the application which fails to properly handle the kernel mode layer. Successful exploitation may lead to denial of service in the form of a system crash.

The host is installed with Nvidia graphics driver with 470.x prior to 472.39 or 495.x prior to 496.49 and is prone to a NULL pointer dereference vulnerability. A flaw is present in the application which fails to properly handle the kernel mode layer. Successful exploitation may lead to denial of service in a component beyond the vulnerable component.

The host is installed with Nvidia graphics driver with 470.x prior to 471.41 and is prone to a NULL pointer dereference vulnerability. A flaw is present in the application which fails to properly handle the kernel mode layer. Successful exploitation may lead to a system crash.

The host is installed with Nvidia graphics driver with 460.x prior to 462.31 or 465.x prior to 466.11 and is prone to a NULL pointer dereference vulnerability. A flaw is present in the application which fails to properly handle the kernel driver. Successful exploitation may lead to system crash.

The host is installed with Microsoft Windows Server 2003 SP2, Vista SP2, Server 2008 SP2, Windows 7 SP1, Server 2008 R2 SP1, Windows 8, Windows 8.1, Server 2012 or Server 2012 R2 and is prone to a Win32k null pointer dereference vulnerability. A flaw is present in the application, which fails to properly validate data passed from user mode. Successful exploitation allows remote attackers to execut ...


Pages:      Start    2643    2644    2645    2646    2647    2648    2649    2650    2651    2652    2653    ..   2653

© SecPod Technologies