[Forgot Password]
Login  Register Subscribe

25354

 
 

132811

 
 

146457

 
 

909

 
 

117103

 
 

156

 
 
Paid content will be excluded from the download.

Filter
Matches : 14732 Download | Alert*

The host is installed with UltraVNC 1.2.0.7 and is prone to multiple out-of-bounds access vulnerabilities. A flaw is present in the application, which fails to handle an improper usage of ClientConnection::CopyBuffer function connected to VNC client code. Successful exploitation could allow attackers to cause code execution.

The host is installed with UltraVNC 1.2.0.7 and is prone to multiple out-of-bounds access vulnerabilities. A flaw is present in the application, which fails to handle an improper usage of SETPIXELS macro in VNC client code. Successful exploitation could allow attackers to cause code execution.

The host is installed with UltraVNC 1.2.0.3 and is prone to an out-of-bounds access vulnerability. A flaw is present in the application, which fails to handle an issue in Ultra2 decoder. Successful exploitation could allow attackers to cause code execution via network connectivity.

The host is installed with UltraVNC 1.2.0.3 and is prone to an out-of-bounds access vulnerability. A flaw is present in the application, which fails to handle an issue in RAW decoder. Successful exploitation could allow attackers to cause code execution via network connectivity.

The host is installed with UltraVNC 1.2.0.3 and is prone to multiple heap buffer overflow vulnerabilities. A flaw is present in the application, which fails to handle an issue in Ultra decoder. Successful exploitation could allow attackers to cause code execution via network connectivity.

The host is installed with oracle fusion middleware mapViewer 12.2.1.2 or 12.2.1.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle the install (Apache Batik) component issue. Successful exploitation allows an attacker to gain access to sensitive information.

The host is installed with VMware Workstation 15.x before 15.5.5, VMware Player 15.x before 15.5.5 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle NVMe functionality. Successful exploitation may allow attackers with local non-administrative access to a virtual machine with a virtual NVMe controller present may be able to rea ...

The host is installed with Apple QuickTime before 7.7.5 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle QuickTime image descriptions. Successful exploitation allows attackers to cause a denial of service or an application crash.

The host is installed with Apache HTTP Server 2.2.12 through 2.2.21 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle expensive request. Successful exploitation could allow remote attackers to cause a denial of service (worker consumption).

The host is installed with Google Chrome and is prone to use-after-free vulnerability. A flaw is present in the application, which fails to properly process SVG font faces and attempts to use already freed resources. Successful exploitation allows remote attackers to cause a denial of service condition.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1473

© SecPod Technologies