[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15162 Download | Alert*

The host is installed with Apple Safari before 3.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with the VMware Workstation 14.x before 14.1.2 or VMware Player 14.x before 14.1.2 and may suffer from denial of service vulnerability. The application fails to properly handle a NULL pointer dereference issue in RPC handler. Successful exploitation of this issue may allow attackers with normal user privileges to crash their VMs.

The host is installed with the VMware Workstation 14.x before 14.1.3 or VMware Player 14.x before 14.1.3 and may suffer from an out-of-bounds read vulnerability. The application fails to properly handle a SVGA Device issue. Successful exploitation of this issue allows an attacker to execute code on the host.

The host is installed with VMware Workstation 15.x before 15.5.0, VMware Player 15.x before 15.5.0 or VMware Horizon client before 5.2.0 and is prone to an use-after-free vulnerability. A local attacker with non-administrative access on the guest machine may exploit this issue to execute code on the host.

The host is installed with Sun JDK or JRE 6 Update 10 through 19 and is prone to an argument injection vulnerability. A flaw is present in the application, which fails to handle the (1) -J or (2) -XXaltjvm argument to javaws.exe. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Java Runtime Environment component of Oracle Java SE 7 Update 2 or before, 6 Update 30 or before and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle multiple protocols. Successful exploitation could allow attackers to take complete control of the affected system or execute arbitrary code.

The host is installed with Oracle Java SE 7u80 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to Hotspot. Successful exploitation could allow attackers to affect integrity.

The host is installed with oracle WebLogic through 12.2.1.4 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle the Web Container issue. Successful exploitation allows an unauthenticated attacker to cause unspecified impact.

The host is installed with Wireshark 2.6.0 to 2.6.7, 2.4.0 to 2.4.13 or 3.0.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the invalid sequence number of zero in wiretap/netscaler.c. Successful exploitation allows attackers to crash the NetScaler file parser.

The host is installed with Wireshark 3.0.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle issues in epan/dissectors/packet-ieee80211.c file. Successful exploitation allows attackers to crash the IEEE 802.11 dissector.


Pages:      Start    1337    1338    1339    1340    1341    1342    1343    1344    1345    1346    1347    1348    1349    1350    ..   1516

© SecPod Technologies