[Forgot Password]
Login  Register Subscribe

24003

 
 

131486

 
 

106342

 
 

909

 
 

84594

 
 

134

 
 
Paid content will be excluded from the download.

Filter
Matches : 11389 Download | Alert*

The host is installed with VMware Workstation before 10.0.4 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a symlink attack on a file in /tmp. Successful exploitation allows local users to write to arbitrary files.

The host is installed with VMware Workstation before 10.0.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle files from vm-support archive. Successful exploitation allows local users to obtain sensitive information by extracting files from this archive.

The host is installed with OpenSSH before 6.6 and is prone to a security bypass vulnerability. A flaw is present in sshd, which fails to properly support wildcards on AcceptEnv lines in sshd_config. Successful exploitation allows remote attackers to bypass intended environment restrictions.

The host is installed with VMware Workstation 9.x before 9.0.1 or VMware Player 5.x before 5.0.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation guest OS users to cause a denial of service (VMX process disruption) by using an invalid port.

The host is installed with Adobe reader or Acrobat 10.x before 10.1.12 or 11.x before 11.0.09 and is prone to a denial of service vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation allows attackers to cause a denial of service (memory corruption).

The host is installed with Adobe reader or Acrobat 10.x before 10.1.12 or 11.x before 11.0.09 and is prone to a denial of service vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.

The host is installed with Adobe reader or Acrobat 10.x before 10.1.12 or 11.x before 11.0.09 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Adobe reader or Acrobat 10.x before 10.1.12 or 11.x before 11.0.09 and is prone to a use-after-free vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Adobe reader or Acrobat 10.x before 10.1.12 or 11.x before 11.0.09 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Microsoft Internet Explorer 6, 7, 8, 9 or 10 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly process a webpage. Successful exploitation could allow attackers to execute arbitrary code or cause a denial of service via a crafted web site.


Pages:      Start    1094    1095    1096    1097    1098    1099    1100    1101    1102    1103    1104    1105    1106    1107    ..   1138

© 2013 SecPod Technologies