[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253390

 
 

909

 
 

197257

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26887 Download | Alert*

The host is installed with Microsoft Server 2008, Server 2008 R2, Server 2012 or Server 2012 R2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a Remote Authentication Dial-In User Service (RADIUS) authentication request. Successful exploitation could allow attackers to send specially crafted username strings to a Network Policy Server ...

The host is installed Microsoft Windows Server 2008, 2008 R2, 2012 or 2012 R2 and is prone a memory corruption vulnerability. A flaw is present in the DNS server, which fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user.

The host is installed with VMware Workstation 6.5.1 and earlier or VMware Player 2.5.1 and earlier and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted IOCTL request. Successful exploitation allows local users to cause a denial of service.

The host is installed with VMware Workstation 7.x before 7.1.6 and 8.x before 8.0.4 or VMware Player 3.x before 3.1.6 and 4.x before 4.0.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted Checkpoint file. Successful exploitation allow user-assisted remote attackers to execute arbitrary code on the host OS or cause a denial of ...

The host is installed with VMware Workstation 8.x before 8.0.5 and 9.x before 9.0.1 on Windows and is prone to a privilege escalation vulnerability. A flaw is present in the Virtual Machine Communication Interface (VMCI) implementation in vmci.sys, which fails to properly restrict memory allocation by control code. Successful exploitation allows local users to gain privileges.

The host is installed with VMware Workstation 10.x before 10.0.5 or VMware Player 6.x before 6.0.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows guest OS users to cause a guest OS denial of service.

The host is installed with VMware Workstation 10.x before 10.0.5 or VMware Player 6.x before 6.0.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted RPC command. Successful exploitation allow attackers to cause a denial of service against a 32-bit guest OS or 64-bit host OS.

An elevation of privilege vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server. The attacker who successfully exploited the vulnerability could then perform cross-site scriptin ...

The host is installed with Malwarebytes Anti-Malware (MBAM) consumer before 2.0.3 and Malwarebytes Anti-Exploit (MBAE) consumer 1.04.1.1012 and earlier and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle issues in the upgrade functionalities. Successful exploitation could allow man-in-the-middle attackers to execute arbitrary code ...

A Tampering vulnerability exists when Microsoft Macro Assembler improperly validates code. An attacker could introduce code into an application, which modifies data in an unintended manner. The security updates addresses the vulnerability by ensuring that Microsoft Macro Assembler properly validates code logic.


Pages:      Start    2610    2611    2612    2613    2614    2615    2616    2617    2618    2619    2620    2621    2622    2623    ..   2688

© SecPod Technologies