[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249982

 
 

909

 
 

195748

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 1807 Download | Alert*

The host is missing an important update according to Adobe advisory, APSB18-39. The update is required to fix an out-of-bounds read vulnerability. The flaws are present in the application, which fails to properly handle unknown vectors. Successful exploitation allows remote attackers to cause code execution.

The host is installed with Apple Mac OS X through 10.12.6, 10.13.6 or 10.14.1 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues. Successful exploitation allows attackers to execute arbitrary code or read restricted memory.

The host is missing a critical update according to Adobe advisory, APSB18-42. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle unknown vectors. Successful exploitation allows remote attackers to cause code execution.

The host is missing a high severity security update according to Microsoft advisory. The update is required to fix multiple vulnerabilities vulnerability. The flaws are present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is missing an important security update according to advisory VMSA-2020-0005 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle improper use of setuid binaries. Successful exploitation may allow local attackers to escalate their privileges to root on the system where Fusion, VMRC or Horizon Client is installed.

The host is missing a security update according to the Apple advisory and is prone to an improper input validation. A flaw is present in the application, which fails to properly handle handle newline character. Successful exploitation allows an attacker disclose credential information to be provided for the wrong host.

The host is missing a security update according to the Apple advisory APPLE-SA-2020-05-20-1 and is prone to an improper input validation. A flaw is present in the application, which fails to properly handle handle newline character. Successful exploitation allows an attacker disclose credential information to the wrong host.

The host is missing a security update according to Apple advisory, APPLE-SA-2020-11-05-6. The update is required to fix multiple vulnerabilities. A flaw is present in the application, which fails to handle a various issues. Successful exploitation allows attackers to execute arbitrary code with kernel privileges.

The host is missing a critical security update according to advisory VMSA-2020-0026 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to handle an issue in XHCI USB controller. Successful exploitation may allow attackers with local administrative privileges on a virtual machine to execute code as the virtual machine's VMX process running on the host.

The host is missing a low severity security update according to advisory VMSA-2020-0029 and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to handle improper input validation in GuestInfo. Successful exploitation may allow attackers with normal user privilege access to a virtual machine to crash the virtual machine's vmx process leading to a denial ...


Pages:      Start    163    164    165    166    167    168    169    170    171    172    173    174    175    176    ..   180

© SecPod Technologies