[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15162 Download | Alert*

The host is installed with Sun Java Runtime Environment JDK or JRE 6 Update 3 or earlier and is prone to a XML External entity attack vulnerability. A flaw is present in the applications, which processes external entity references even when the "external general entities" property is false,. Successful exploitation could allow attackers to conduct XML external entity (XXE) attacks and cause a deni ...

The host is installed with Microsoft XML Core Services 3.0 on Microsoft Windows Server 2003 SP2, Vista SP2, Server 2008 SP2, Windows 7 SP1, Server 2008 R2 SP1, Windows 8, 8.1, Server 2012 or Server 2012 R2 or Microsoft XML Core Services 6.0 on Microsoft Windows Server 2003 SP2, Vista SP2, Server 2008 SP2, Windows 7 SP1 or Server 2008 R2 SP1 and is prone to information disclosure vulnerability. A f ...

The host is installed with VMware Workstation 7.1.x before 7.1.4 or VMware Player 3.1.x before 3.1.4 and is prone to unauthorized modification and denial of service. A flaw is present in the application, which is triggered when a Solaris or FreeBSD guest OS is used. Successful exploitation could allow the guest OS users to do unauthorized modification of guest OS files and directories and create d ...

The host is installed with DirectShow in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, Windows 8.1 or Windows Server 2012 R2 and is prone to a elevation of privilege vulnerability. A flaw is present in the application, which fails to properly handle certain objects. Successful exploitation could allow attackers to execute arbitrary ...

The host is installed with Microsoft Windows Server 2008, Server 2008 R2, Windows Vista, Windows 7, Server 2012, Server 2012 R2, Windows 8 or Windows 8.1 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could allow attackers to execute an arbitrary program at the same integrity l ...

The host is installed with Oracle MySQL 5.1 before 5.1.49 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle InnoDB storage engine. Successful exploitation allows remote authenticated users to cause a denial of service (assertion failure).

The host is installed with Microsoft Server 2003, Server 2008, Server 2008 R2, Windows Vista, Windows 7, Server 2012, Server 2012 R2, Windows 8 or Windows 8.1 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to handle a crafted application. Successful exploitation could allow attackers to run arbitrary code in kernel mode.

The host is installed with Microsoft Server 2003, Server 2008, Server 2008 R2, Windows Vista, Windows 7, Server 2012, Server 2012 R2, Windows 8 or Windows 8.1 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to handle a crafted application. Successful exploitation could allow attackers to run processes in an elevated context.

The host is installed with Microsoft Server 2003, Server 2008, Server 2008 R2, Windows Vista, Windows 7, Server 2012, Server 2012 R2, Windows 8 or Windows 8.1 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which improperly handles the repair of a previously installed application. Successful exploitation could allow attackers to install programs; view ...

The host is installed with .Net framework 2.0, 3.0 or 3.5.1 and is prone to an security feature bypass vulnerability. A flaw is present in the application, which fails to handle a crafted web site. Successful exploitation could allow an attacker to bypass the Address Space Layout Randomization (ASLR) security feature.


Pages:      Start    1428    1429    1430    1431    1432    1433    1434    1435    1436    1437    1438    1439    1440    1441    ..   1516

© SecPod Technologies