[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15028 Download | Alert*

The host is installed with the VMware Workstation 12.x before 12.5.8 or VMware Player 12.x before 12.5.8 and is prone to a heap buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle VNC packets processing. Successful exploitation could result in remote code execution in a virtual machine via the authenticated VNC session.

The host is installed with the VMware Workstation 12.x before 12.5.8 or VMware Player 12.x before 12.5.8 and is prone to a stack overflow vulnerability. A flaw is present in the application, which fails to properly handle VNC packets processing. Successful exploitation could result in remote code execution in a virtual machine via the authenticated VNC session.

The host is installed with the VMware Workstation 14.x before 14.1.2 or VMware Player 14.x before 14.1.2 and may suffer from multiple out-of-bounds read vulnerabilities. The application fails to properly handle shader translator issue. Successful exploitation of these issues may lead to information disclosure or may allow attackers with normal user privileges to crash their VMs.

The host is installed with the VMware Workstation 14.x before 14.1.2 or VMware Player 14.x before 14.1.2 and may suffer from multiple out-of-bounds read vulnerabilities. The application fails to properly handle shader translator issue. Successful exploitation of these issues may lead to information disclosure or may allow attackers with normal user privileges to crash their VMs.

The host is installed with the VMware Workstation 14.x before 14.1.2 or VMware Player 14.x before 14.1.2 and may suffer from multiple out-of-bounds read vulnerabilities. The application fails to properly handle shader translator issue. Successful exploitation of these issues may lead to information disclosure or may allow attackers with normal user privileges to crash their VMs.

An information disclosure vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server. The attacker who successfully exploited the vulnerability could then perform cross-site scriptin ...

The host is installed with oracle fusion middleware mapViewer 12.2.1.2 or 12.2.1.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle the map builder component issue. Successful exploitation allows an attacker to gain access to sensitive information.

The host is installed with oracle fusion middleware mapViewer 12.2.1.2 or 12.2.1.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle the map builder component issue. Successful exploitation allows an attacker to gain elevated privileges.

The host is installed with Puppet 2.6.x before 2.6.15 or 2.7.x before 2.7.13 or Puppet Enterprise 2.5.0 and is prone to denial of service vulnerability. A flaw is present in the applications, which fail to properly handle REST requests. Successful exploitation allows attackers with agent SSL keys to corrupt the memory or filesystem.

The host is installed with Puppet 2.6.x before 2.6.15 or 2.7.x before 2.7.13 or Puppet Enterprise 2.5.0 and is prone to symlink attack. A flaw is present in the applications, which fail to properly handle REST requests for a file from a remote filebucket. Successful exploitation allows wttackers ith an authorized SSL key and certain permissions on the puppet master to read arbitrary files via a sy ...


Pages:      Start    1313    1314    1315    1316    1317    1318    1319    1320    1321    1322    1323    1324    1325    1326    ..   1502

© SecPod Technologies