[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250108

 
 

909

 
 

196064

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26295 Download | Alert*

The host is installed with Oracle WebLogic Server component in Oracle WebLogic Server through 10.3.6.0 or 12.1.3.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle Web Services. Successful exploitation can cause unspecified impact.

The host is installed with Oracle WebLogic Server component in Oracle WebLogic Server through 10.3.6.0 or 12.1.3.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle Web Services. Successful exploitation can cause unspecified impact.

The host is installed with MariaDB before 10.1.48 or 10.2.x before 10.2.35 and is prone to a privilege escalation vulnerability. A flaw is present in the application which fails to properly handle an issue with named pipes. Successful exploitation allows remote authenticated users to access SQL requests and responses and execute SQL commands.

The host is installed with Apache CouchDB before 1.0.4, 1.1.x before 1.1.2 or 1.2.x before 1.2.1 and is prone to a directory traversal vulnerability. A flaw is present in the application, which fails to handle the partition2 function in mochiweb_util.erl. Successful exploitation could allow remote attackers to read arbitrary files via a ..\ (dot dot backslash) in the default URI.

The host is installed with FactoryTalk Linx 6.00, 6.10 or 6.11 and is prone to a path traversal vulnerability. A flaw is present in application, which fails to properly handle an exposed API call. Successful exploitation may allow an attacker to use specially crafted requests to traverse the file system and expose sensitive data on the local hard drive.

The host is installed with Microsoft Active Directory and is prone to a denial of service vulnerability. A flaw is present in Active Directory, which fails to handle multiple machine accounts created by an authenticated attacker. An attacker who successfully exploited this vulnerability could cause the Active Directory service to become non-responsive.

The host is installed with the VMware Workstation 11.x before 11.1.2 or VMware Player 7.x before 7.1.2 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows Windows guest OS users to gain guest OS privileges or cause a denial of service (guest OS kernel memory corruption).

The host is installed with VMware Workstation 5.5.4, 6.0.2, VMware Player 1.0.4 or 2.0.2 and is prone to a directory traversal vulnerability. A flaw is present in the application, which fails to handle a crafted VMCI calls that trigger memory. Successful exploitation allows attackers to allows guest OS users to read and write arbitrary files on the host OS string that produces a wide character str ...

The host is installed with VMware Workstation 10.x before 10.0.7, 11.x before 11.1.1, VMware Player 6.x before 6.0.7 or 7.x before 7.1.1 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails handle a thread injection, Successful exploitation allows host OS users to gain host OS privileges.

The host is installed with Oracle VM VirtualBox 5.1.x before 5.1.4 and is prone to a privilege escalation vulnerability. A flaw is present in the VirtualBox Remote Desktop Extension (VRDE), which fails to handle unknown vectors. Successful exploitation can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauth ...


Pages:      Start    2577    2578    2579    2580    2581    2582    2583    2584    2585    2586    2587    2588    2589    2590    ..   2629

© SecPod Technologies