[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14850 Download | Alert*

An elevation of privilege vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server. The attacker who successfully exploited the vulnerability could then perform cross-site scriptin ...

An elevation of privilege vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server. The attacker who successfully exploited the vulnerability could then perform cross-site scriptin ...

The host is installed with Trillian 3.1.0.121 and is prone to a ssl certificate vulnerability. A flaw is present in the application, which fails to handle a spoofed SSL certificate. Successful exploitation could allow attackers to obtain MSN credentials via a man-in-the-middle attack.

The host is installed with GIMP through 2.10.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle an issue in the way GIMP makes g_get_tmp_dir calls to establish temporary filenames. Successful exploitation could allow attackers to overwrite files or read file content that was intended to be private.

The host is installed with Apple iTunes before 12.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted website. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with PostgreSQL 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7 or 9.3.x before 9.3.3 and is prone to multiple integer overflow vulnerabilities. The flaws are present in the application, which fails to handle vectors related to the (1) hstore_recv, (2) hstore_from_arrays, and (3) hstore_from_array functions in contrib/hstore/hstore_io.c; and the (4) hstoreArrayTo ...

The host is installed with the VMware Workstation 12.x before 12.5.8 or VMware Player 12.x before 12.5.8 and is prone to a heap buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle VNC packets processing. Successful exploitation could result in remote code execution in a virtual machine via the authenticated VNC session.

The host is installed with the VMware Workstation 12.x before 12.5.8 or VMware Player 12.x before 12.5.8 and is prone to a stack overflow vulnerability. A flaw is present in the application, which fails to properly handle VNC packets processing. Successful exploitation could result in remote code execution in a virtual machine via the authenticated VNC session.

The host is installed with the VMware Workstation 14.x before 14.1.2 or VMware Player 14.x before 14.1.2 and may suffer from multiple out-of-bounds read vulnerabilities. The application fails to properly handle shader translator issue. Successful exploitation of these issues may lead to information disclosure or may allow attackers with normal user privileges to crash their VMs.

The host is installed with the VMware Workstation 14.x before 14.1.2 or VMware Player 14.x before 14.1.2 and may suffer from multiple out-of-bounds read vulnerabilities. The application fails to properly handle shader translator issue. Successful exploitation of these issues may lead to information disclosure or may allow attackers with normal user privileges to crash their VMs.


Pages:      Start    1332    1333    1334    1335    1336    1337    1338    1339    1340    1341    1342    1343    1344    1345    ..   1484

© SecPod Technologies