[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14298 Download | Alert*

The host is installed with Microsoft Internet Explorer 6 through 8 and is prone to a VML style remote code execution vulnerability. A flaw is present in the application, which fails to properly handle a deleted object in memory. Successful exploitation could allow attackers to execute arbitrary code.

Microsoft Internet Explorer 5.01, 6, and 7 allows remote attackers to execute arbitrary code by causing Internet Explorer to access an uninitialized or deleted object, related to prototype variables and table cells, aka "Uninitialized Memory Corruption Vulnerability."

An elevation of privilege vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server. The attacker who successfully exploited the vulnerability could then perform cross-site scriptin ...

An elevation of privilege vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server. The attacker who successfully exploited the vulnerability could then perform cross-site scriptin ...

An elevation of privilege vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server. The attacker who successfully exploited the vulnerability could then perform cross-site scriptin ...

The host is installed with Trillian 3.1.0.121 and is prone to a ssl certificate vulnerability. A flaw is present in the application, which fails to handle a spoofed SSL certificate. Successful exploitation could allow attackers to obtain MSN credentials via a man-in-the-middle attack.

The host is installed with GIMP through 2.10.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle an issue in the way GIMP makes g_get_tmp_dir calls to establish temporary filenames. Successful exploitation could allow attackers to overwrite files or read file content that was intended to be private.

The host is installed with PostgreSQL 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7 or 9.3.x before 9.3.3 and is prone to multiple integer overflow vulnerabilities. The flaws are present in the application, which fails to handle vectors related to the (1) hstore_recv, (2) hstore_from_arrays, and (3) hstore_from_array functions in contrib/hstore/hstore_io.c; and the (4) hstoreArrayTo ...

The host is installed with the VMware Workstation 12.x before 12.5.8 or VMware Player 12.x before 12.5.8 and is prone to a heap buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle VNC packets processing. Successful exploitation could result in remote code execution in a virtual machine via the authenticated VNC session.

The host is installed with the VMware Workstation 12.x before 12.5.8 or VMware Player 12.x before 12.5.8 and is prone to a stack overflow vulnerability. A flaw is present in the application, which fails to properly handle VNC packets processing. Successful exploitation could result in remote code execution in a virtual machine via the authenticated VNC session.


Pages:      Start    1239    1240    1241    1242    1243    1244    1245    1246    1247    1248    1249    1250    1251    1252    ..   1429

© SecPod Technologies