[Forgot Password]
Login  Register Subscribe

24437

 
 

131815

 
 

116370

 
 

909

 
 

90976

 
 

142

 
 
Paid content will be excluded from the download.

Filter
Matches : 14139 Download | Alert*

The host is installed with the VMware Workstation 14.x before 14.1.4, 15.x before 15.0.1 or VMware Player 14.x before 14.1.4, 15.x before 15.0.1 and may suffer from a remote code-execution vulnerability. The application fails to properly handle vmxnet3 virtual network adapter. Successful exploitation of this issues may lead to an information leak from host to guest.

The host is installed with Adobe Flash Player before 10.3.183.29 or 11.x before 11.4.402.287 or Adobe AIR 3.4.0.2540 or before and is prone to buffer overflow vulnerability. A flaw is present in the applications, which fail to properly handle memory. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Adobe Flash Player before 10.3.183.48, 11.x before 11.5.502.135 or Adobe Air before 3.5.0.880 and is prone to a buffer overflow vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Adobe Flash Player before 10.3.183.48, 11.x before 11.5.502.135 or Adobe Air before 3.5.0.880 and is prone to an integer overflow vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with RealPlayer 18.1.5.705 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a repeating VRAT chunk in qcpfformat.dll. Successful exploitation could allow attackers to cause a null pointer dereference and crash.

The host is installed with RealPlayer 16.0.3.51 and earlier is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed .3gp file. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Pale Moon before 27.9.3 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to handle the DOMProxyHandler::EnsureExpandoObject function issue. Successful exploitation allows attackers to perform a use-after-free attack.

The host is installed with Pale Moon before 15.4 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle the bounds-check user-supplied input issue. Successful exploitation allows attackers to execute arbitrary code in the context of the application.

A remote code execution vulnerability exists when "Windows Theme API" does not properly decompress files. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; vie ...

An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first ...


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1413

© SecPod Technologies