[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15028 Download | Alert*

The host is installed with Oracle Java SE 5 Update 17 or earlier, 6 Update 12 or earlier or 1.4.2_19 or earlier and is prone to cross-site scripting vulnerability. A flaw is present in the applications, which fails to properly handle unknown vectors related to LiveConnect. Successful exploitation allows user-assisted attackers to bypass intended access restrictions.

The host is installed with Oracle Java SE 5 Update 17 or earlier or 6 Update 12 or earlier and is prone to swing jlabel HTML parsing vulnerability. A flaw is present in the applications, which fails to properly handle unknown vectors. Successful exploitation allows user-assisted attackers to bypass intended access restrictions.

The host is installed with Oracle Java SE 6 Update 12, 11 or 10 and is prone to unspecified vulnerability. A flaw is present in the applications, which does not properly handle unknown vectors. Successful exploitation allows remote attackers to bypass intended access restrictions and connect to arbitrary sites.

The host is installed with VMware Workstation 6.0.2 or VMware Player 2.0.x before 2.0.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle VIX API calls. Successful exploitation allows remote attackers to have unknown impact and attack vectors.

Heap-based buffer overflow in IrfanView before 4.27 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PSD image with RLE compression.

The host is installed with Windows XP, Windows Vista, Windows Server 2008, Windows Server 2008 R2, Windows Server 2003, Windows 7, Windows 8, Windows Server 2012, Windows 8.1 or Windows Server 2012 R2 and is prone to a remote code execution vulnerability. A flaw is present in the application, which improperly restricts the path used for processing .bat and .cmd files. Successful exploitation could ...

The host is installed with Microsoft Windows Server 2003, 2008, 2008 R2, 2012, 2012 R2, Windows Vista, 7, 8, 8.1 and is prone to a DLL planting remote code execution vulnerability. A flaw is present in the application, which fails to properly handle loading of DLL files. Successful exploitation could allow attackers to take complete control of the affected system.

The host is installed with the VMware Workstation 12.x before 12.5.0 or VMware Player 12.x before 12.5.0 and is prone to a DLL hijack vulnerability. A flaw is present in the application, which improperly load DLL files. Successful exploitation allows attacker to load a DLL file which could execute arbitrary code.

The host is installed with VMware Workstation 15.x before 15.5.1, VMware Player 15.x before 15.5.1 and is prone to a DLL hijacking vulnerability. A flaw is present in the application, which fails to handle an insecure loading of a DLL by Cortado Thinprint. Successful exploitation may allow attackers with normal user privileges to escalate their privileges to administrator on a Windows machine wher ...

The host is installed with IBM DB2 9.5 before FP9 and is prone to denial of service vulnerability. A flaw is present in the application, which calls the XMLPARSE function with a crafted string expression. Successful exploitation allows remote attackers to deny service to legitimate users.


Pages:      Start    1381    1382    1383    1384    1385    1386    1387    1388    1389    1390    1391    1392    1393    1394    ..   1502

© SecPod Technologies