[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26604 Download | Alert*

The host is installed with Oracle VM VirtualBox before 6.1.18 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle vectors related to Core. Successful exploitation allows unauthorized attackers to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox.

The host is installed with Oracle VM VirtualBox before 6.1.18 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle vectors related to Core. Successful exploitation allows unauthorized attackers to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox.

The host is installed with Oracle VM VirtualBox before 6.1.18 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle vectors related to Core. Successful exploitation allows attackers to takeover Oracle VM VirtualBox.

The host is installed with Oracle VM VirtualBox before 6.1.18 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle vectors related to Core. Successful exploitation allows unauthorized attackers to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox.

The host is installed with VideoLAN VLC media player through 3.0.11 and is prone to a out-of-bounds write vulnerability. A flaw is present in the application, which fails to properly handle an issue in EbmlTypeDispatcher::send. Successful exploitation could allow attackers to trigger a heap-based buffer overflow via a crafted .mkv file.

The host is installed with Opera before 12.01 and is prone to cross-site scripting (XSS) vulnerability. A flaw is present in the application, which ignores some characters in HTML documents in unspecified circumstances. Successful exploitation allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted document.

The host is installed with Opera before 12.01 and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to handle a small window for the download dialog. Successful exploitation allows user-assisted remote attackers to trick users into downloading and executing arbitrary files.

The host is installed with Opera before 12.01 and is prone to Cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to properly escape characters in DOM elements. Successful exploitation allows remote attackers to bypass cross-site scripting (XSS) protection mechanisms via a crafted HTML document.

The host is installed with Opera before 12.01 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to a "low severity issue." Successful exploitation has unknown impact and attack vectors.

The host is installed with Opera before 12.01 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted web site. Successful exploitation allows remote attackers to cause application crash.


Pages:      Start    1251    1252    1253    1254    1255    1256    1257    1258    1259    1260    1261    1262    1263    1264    ..   2660

© SecPod Technologies