[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248585

 
 

909

 
 

195621

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15028 Download | Alert*

The host is installed with the VMware Workstation 14.x before 14.1.2 or VMware Player 14.x before 14.1.2 and may suffer from denial of service vulnerability. The application fails to properly handle a NULL pointer dereference issue in RPC handler. Successful exploitation of this issue may allow attackers with normal user privileges to crash their VMs.

The host is installed with the VMware Workstation 14.x before 14.1.3 or VMware Player 14.x before 14.1.3 and may suffer from an out-of-bounds read vulnerability. The application fails to properly handle a SVGA Device issue. Successful exploitation of this issue allows an attacker to execute code on the host.

The host is installed with VMware Workstation 15.x before 15.5.0, VMware Player 15.x before 15.5.0 or VMware Horizon client before 5.2.0 and is prone to an use-after-free vulnerability. A local attacker with non-administrative access on the guest machine may exploit this issue to execute code on the host.

Unspecified vulnerability in Microsoft Word 2000, 2002, and 2003 and Word Viewer 2003 allows remote attackers to execute code via unspecified vectors related to malformed data structures that trigger memory corruption, a different vulnerability than CVE-2006-5994.

Unspecified vulnerability in Microsoft Word 2000, 2002, and Word Viewer 2003 allows user-assisted remote attackers to execute arbitrary code via a crafted DOC file that triggers memory corruption, as demonstrated via the 12122006-djtest.doc file, a different issue than CVE-2006-5994 and CVE-2006-6456.

Microsoft Internet Explorer 5.01, 6, and 7 uses certain COM objects from (1) Msb1fren.dll, (2) Htmlmm.ocx, and (3) Blnmgrps.dll as ActiveX controls, which allows remote attackers to execute arbitrary code via unspecified vectors, a different issue than CVE-2006-4697.

The wininet.dll FTP client code in Microsoft Internet Explorer 5.01 and 6 might allow remote attackers to execute arbitrary code via an FTP server response of a specific length that causes a terminating null byte to be written outside of a buffer, which causes heap corruption.

The host is installed with Sun JDK or JRE 6 Update 10 through 19 and is prone to an argument injection vulnerability. A flaw is present in the application, which fails to handle the (1) -J or (2) -XXaltjvm argument to javaws.exe. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Java Runtime Environment component of Oracle Java SE 7 Update 2 or before, 6 Update 30 or before and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle multiple protocols. Successful exploitation could allow attackers to take complete control of the affected system or execute arbitrary code.

The host is installed with Oracle Java SE 7u80 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to Hotspot. Successful exploitation could allow attackers to affect integrity.


Pages:      Start    1294    1295    1296    1297    1298    1299    1300    1301    1302    1303    1304    1305    1306    1307    ..   1502

© SecPod Technologies