[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15162 Download | Alert*

The host is installed with Microsoft Windows Server 2003 SP2, Vista SP2, Server 2008 SP2, Windows 7 SP1, Server 2008 R2 SP1, Windows 8, 8.1, Server 2012, 2012 R2 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to process certain specially crafted bitmap conversions. Successful exploitation could allow attackers to install programs; view, c ...

The host is installed with Microsoft Windows Vista SP2, Server 2008 SP2, Windows 7 SP1, Server 2008 R2 SP1, Windows 8, Server 2012, Windows 8.1 or Server 2012 R2 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to properly validate and enforce impersonation levels. An attacker who successfully exploited this vulnerability could bypass imper ...

The host is installed with Microsoft Windows Vista SP2, Server 2008 SP2, Windows 7 SP1, Server 2008 R2 SP1, Windows 8, Server 2012, Windows 8.1 or Server 2012 R2 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which improperly allows certain registry interactions from within vulnerable sandboxed applications. An attacker who successfully exploited thi ...

The host is installed with Microsoft Windows Vista SP2, Server 2008 SP2, Windows 7 SP1, Server 2008 R2 SP1, Windows 8, Server 2012, Windows 8.1 or Server 2012 R2 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which improperly allows certain filesystem interactions from within vulnerable sandboxed applications. An attacker who successfully exploited t ...

The host is installed with OpenAFS before 1.6.1300 and is prone to a data spoofing vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows remote attackers to spoof bos commands.

The host is installed with Vista SP2, Server 2008 SP2, Windows 7 SP1 or Server 2008 R2 SP1 and is prone to an elevation of privilege vulnerability. A flaw is present in the Windows kernel, which fails to properly handle objects in memory. Successful exploitation could run arbitrary code in kernel mode.

The host is installed with WSO2 API Manager 2.6.0 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle an issue in file upload component. Successful exploitation could allow attackers to upload any type of file by changing the extension to an allowed one.

The host is installed with Windows Media Center on Microsoft Windows Vista, 7 or 8.1 and is prone to a remote Code Execution Vulnerability. A flaw is present in the application, which fails to handle a specially crafted Media Center link (.mcl) file that references malicious code. Successful exploitation could allow attackers to take complete control of the affected system or disclose sensitive in ...

The host is installed with VMware Workstation 6.5.1 and earlier or VMware Player 2.5.1 and earlier and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted IOCTL request. Successful exploitation allows local users to cause a denial of service.

The host is installed with VMware Workstation 7.x before 7.1.6 and 8.x before 8.0.4 or VMware Player 3.x before 3.1.6 and 4.x before 4.0.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted Checkpoint file. Successful exploitation allow user-assisted remote attackers to execute arbitrary code on the host OS or cause a denial of ...


Pages:      Start    1431    1432    1433    1434    1435    1436    1437    1438    1439    1440    1441    1442    1443    1444    ..   1516

© SecPod Technologies