[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

251139

 
 

909

 
 

196159

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26317 Download | Alert*

The host is installed with VMware Workstation 10.x before 10.0.7, 11.x before 11.1.1, VMware Player 6.x before 6.0.7 or 7.x before 7.1.1 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails handle a thread injection, Successful exploitation allows host OS users to gain host OS privileges.

The host is installed with Oracle VM VirtualBox 5.1.x before 5.1.4 and is prone to a privilege escalation vulnerability. A flaw is present in the VirtualBox Remote Desktop Extension (VRDE), which fails to handle unknown vectors. Successful exploitation can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauth ...

The host is installed with Oracle VM VirtualBox 5.0.x before 5.0.28 or 5.1.x before 5.1.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation can result in unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial ...

The host is installed with Oracle VM VirtualBox 5.0.x before 5.0.28 or 5.1.x before 5.1.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox.

The host is installed with Oracle VM VirtualBox 5.0.x before 5.0.28 or 5.1.x before 5.1.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox.

The host is installed with Oracle WebLogic Server component in Oracle Fusion Middleware 12.1.3.0, 12.2.1.0 or 12.2.1.1 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to CIE. Successful exploitation allows remote attackers to affect confidentiality and integrity.

The host is installed with Microsoft SharePoint Foundation 2010 and is prone toelevation of privilege vulnerability. A flaw is present in the application, which fails to properly validate user input. Successful exploitation allows attackers to read unauthorized content.

The host is installed with Microsys Promotic before 8.1.5 and is prone to a directory traversal vulnerability. A flaw is present in the application, which fails to handle a crafted application. Successful exploitation could allow attackers to read arbitrary file.

The host is installed with Apache Subversion 1.8.0 before 1.8.2 and is prone to a FSFS repository corruption vulnerability. A flaw is present in the application, which fails to proper edit revision properties. Successful exploitation could allow wrong file to get deleted.

The host is installed with Microsoft Windows Server 2008 R2, Windows Vista, Windows 7, Server 2012, Server 2012 R2, Windows 8 or Windows 8.1 and is prone to a directory traversal elevation of privilege vulnerability. A flaw is present in the TS WebProxy Windows component, which fails to properly sanitize file paths. Successful exploitation could allow attackers to gain the same user rights as the ...


Pages:      Start    2580    2581    2582    2583    2584    2585    2586    2587    2588    2589    2590    2591    2592    2593    ..   2631

© SecPod Technologies