[Forgot Password]
Login  Register Subscribe

24128

 
 

131573

 
 

110204

 
 

909

 
 

85984

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 12086 Download | Alert*

A security feature bypass vulnerability exists when Skype for Business or Lync do not properly parse UNC path links shared via messages. An attacker who successfully exploited the vulnerability could execute arbitrary commands in the context of the logged-in user. The security feature bypass by itself does not allow arbitrary code execution. Instead, an attacker would have to convince users to cli ...

A Tampering vulnerability exists when Microsoft Macro Assembler improperly validates code. An attacker could introduce code into an application, which modifies data in an unintended manner. The security updates addresses the vulnerability by ensuring that Microsoft Macro Assembler properly validates code logic.

A denial of service vulnerability exists when Windows improperly handles File Transfer Protocol (FTP) connections. An attacker who successfully exploited the vulnerability could cause a target system to stop responding. To exploit the vulnerability, an unauthenticated attacker could send specially crafted packets to a Windows computer with the FTP Server role enabled that is accepting connections ...

An elevation of privilege vulnerability exists in .NET Framework which could allow an attacker to elevate their privilege level. To exploit the vulnerability, an attacker would first have to access the local machine, and then run a malicious program. The update addresses the vulnerability by correcting how .NET Framework activates COM objects.

A Security Feature Bypass vulnerability exists in ASP.NET when the number of incorrect login attempts is not validated. An attacker who successfully exploited this vulnerability could try an infinite number of authentication attempts. The update addresses the vulnerability by validating the number of incorrect login attempts.

A remote code execution vulnerability exists in Visual Studio software when the software does not check the source markup of a file for an unbuilt project. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An at ...

The host is installed with the VMware Workstation 14.x before 14.1.2 or VMware Player 14.x before 14.1.2 and may suffer from multiple out-of-bounds read vulnerabilities. The application fails to properly handle shader translator issue. Successful exploitation of these issues may lead to information disclosure or may allow attackers with normal user privileges to crash their VMs.

The host is installed with the VMware Workstation 14.x before 14.1.2 or VMware Player 14.x before 14.1.2 and may suffer from multiple out-of-bounds read vulnerabilities. The application fails to properly handle shader translator issue. Successful exploitation of these issues may lead to information disclosure or may allow attackers with normal user privileges to crash their VMs.

The host is installed with the VMware Workstation 14.x before 14.1.2 or VMware Player 14.x before 14.1.2 and may suffer from multiple out-of-bounds read vulnerabilities. The application fails to properly handle shader translator issue. Successful exploitation of these issues may lead to information disclosure or may allow attackers with normal user privileges to crash their VMs.

The host is installed with VideoLAN VLC media player 3.0.1 and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to handle a crafted .swf file. Successful exploitation could allow remote attackers to cause a denial-of-service.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1208

© SecPod Technologies