[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 27003 Download | Alert*

The host is installed with vm2 before 3.9.17 and is prone to a sandbox escape vulnerability. A flaw is present in the application, which fails to properly handle issues in exception sanitization. Successful exploitation could allow attackers to raise an unsanitized host exception inside 'handleException()' which can be used to escape the sandbox and run arbitrary code in host context.

The host is installed with vm2 before 3.9.16 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle issues in source code transformer. Successful exploitation could allow attackers to bypass the sandbox protections to gain remote code execution rights on the host running the sandbox.

The host is installed with VMware Workstation 17.x before 17.0.1 or VMware Player 17.x before 17.0.1 and is prone to an out-of-bounds read/write vulnerability. A flaw is present in the application, which fails to properly handle the SCSI CD/DVD device emulation. Successful exploitation allows an attacker with access to a virtual machine that has a physical CD/DVD drive attached and configured to u ...

The host is installed with VMware Workstation 17.x before 17.0.2 or VMware Player 17.x before 17.0.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle the functionality for sharing host Bluetooth devices with the virtual machine. Successful exploitation allows an attacker with local administrative privileges on a virtual m ...

The host is installed with VMware Workstation 17.x before 17.0.2 or VMware Player 17.x before 17.0.2 and is prone to a stack-based buffer-overflow vulnerability. A flaw is present in the application, which fails to properly handle the functionality for sharing host Bluetooth devices with the virtual machine. Successful exploitation allows an attacker with local administrative privileges on a virtu ...

The host is installed with JetBrains PhpStorm before 2023.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to add source code to debug logs.

The host is installed with vm2 before 3.9.15 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle issue in the sandbox protections. Successful exploitation could allow attackers to bypass the sandbox protections to gain remote code execution rights on the host running the sandbox.

The host is installed with Docker Desktop 4.17.x and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle the Artifactory Integration falling back to sending registry credentials over plain HTTP instead of HTTPS. Successful exploitation could allow attackers to perform a targeted network sniffing attack which can lead to a disclosure of s ...

The host is installed with 3CX DesktopApp 18.12.407 or 18.12.416 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle an embedded malicious code. Successful exploitation could allow attackers to run a complex supply chain attack and pick who would be downloading the next stages of the malware.

The host is installed with Oracle VM VirtualBox before 6.1.32 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Core. Successful exploitation allows attackers to affect Confidentiality.


Pages:      Start    1358    1359    1360    1361    1362    1363    1364    1365    1366    1367    1368    1369    1370    1371    ..   2700

© SecPod Technologies