[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

251782

 
 

909

 
 

196543

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14298 Download | Alert*

A remote code execution vulnerability exists in Microsoft Office software when the Office software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could ...

The host is installed with VMWare Tools 10.x before 10.3.0 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle the issue in HGFS. Successful exploitation may lead to information disclosure or may allow attackers to escalate their privileges on the guest VMs.

The host is installed with VMware Workstation 14.x before 14.1.6, 15.x before 15.0.3 or VMware Player 14.x before 14.1.6, 15.x before 15.0.3 and is prone to an out-of-bounds vulnerability. The application fails to handle an issue in the vertex shader functionality. Successful exploitation of this issue may lead to information disclosure or may allow attackers with normal user privileges to create ...

The host is installed with VMware Workstation 14.x before 14.1.6, 15.x before 15.0.3 or VMware Player 14.x before 14.1.6, 15.x before 15.0.3 and is prone to multiple out-of-bounds read vulnerabilities. The application fails to handle an issue in the shader translator. Successful exploitation of this issue may lead to information disclosure or may allow attackers with normal user privileges to crea ...

The host is installed with VMware Workstation 14.x before 14.1.6, 15.x before 15.0.3 or VMware Player 14.x before 14.1.6, 15.x before 15.0.3 and is prone to an out-of-bounds read vulnerability. The application fails to handle an issue in the 3D-acceleration feature. Successful exploitation of this issue may lead to information disclosure.

The host is installed with VMWare Tools 10.2.x or 10.3.x before 10.3.10 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle the issue in vm3dmp driver. Successful exploitation may allow an attacker to leak kernel information or create a denial of service attack on the Windows guest machine.

The host is installed with PostgreSQL 11.x before 11.5, 10.x before 10.10, 9.6.x before 9.6.15, 9.5.x before 9.5.19, 9.4.x before 9.4.24 and is prone to a code execution vulnerability. A flaw is present in the application which fails to properly validate input. Successful exploitation allows execution of a code from unprotected directory.

The host is installed with Microsoft Office 2007 SP3, Office 2010 SP2 or Office 2013 SP1 and is prone to an use after free vulnerability. The flaw is present in the applications, which improperly handle objects in memory while parsing specially crafted office files. Successful exploitation allows attackers to execute arbitrary code.

A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the ...

The host is installed with Oracle Java SE 5.0 before Update 20 and is prone to unspecified vulnerability. A flaw is present in the applications, which fails to properly handle unknown vectors. Successful exploitation has unknown impact and attack vectors.


Pages:      Start    1303    1304    1305    1306    1307    1308    1309    1310    1311    1312    1313    1314    1315    1316    ..   1429

© SecPod Technologies