[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14298 Download | Alert*

The host is installed with VMware Workstation 7.x before 7.1.6 and 8.x before 8.0.4 or VMware Player 3.x before 3.1.6 and 4.x before 4.0.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted Checkpoint file. Successful exploitation allow user-assisted remote attackers to execute arbitrary code on the host OS or cause a denial of ...

The host is installed with VMware Workstation 8.x before 8.0.5 and 9.x before 9.0.1 on Windows and is prone to a privilege escalation vulnerability. A flaw is present in the Virtual Machine Communication Interface (VMCI) implementation in vmci.sys, which fails to properly restrict memory allocation by control code. Successful exploitation allows local users to gain privileges.

The host is installed with VMware Workstation 10.x before 10.0.5 or VMware Player 6.x before 6.0.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows guest OS users to cause a guest OS denial of service.

The host is installed with VMware Workstation 10.x before 10.0.5 or VMware Player 6.x before 6.0.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted RPC command. Successful exploitation allow attackers to cause a denial of service against a 32-bit guest OS or 64-bit host OS.

The host is installed with OfficeSIP server 3.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted To header in a SIP INVITE message. Successful exploitation could allow attackers to crash the service.

The host is installed with Siemens Automation License Manager (ALM) 4.0 through 5.1+SP1+Upd1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the crafted content in a get_target_ocx_param or send_target_ocx_param command. Successful exploitation allows remote attackers to cause a NULL pointer dereference and daemon crash.

The host is installed with Siemens Automation License Manager (ALM) 4.0 through 5.1+SP1+Upd1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle long fields. Successful exploitation allows remote attackers to crash the daemon.

An elevation of privilege vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server. The attacker who successfully exploited the vulnerability could then perform cross-site scriptin ...

The host is installed with IBM solidDB 6.5 before Interim Fix 5 or 7.0 before FP1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a SELECT statement with a ROWNUM condition involving a subquery. Successful exploitation could allow attackers to crash the service.

The host is installed with Malwarebytes Anti-Malware (MBAM) consumer before 2.0.3 and Malwarebytes Anti-Exploit (MBAE) consumer 1.04.1.1012 and earlier and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle issues in the upgrade functionalities. Successful exploitation could allow man-in-the-middle attackers to execute arbitrary code ...


Pages:      Start    1314    1315    1316    1317    1318    1319    1320    1321    1322    1323    1324    1325    1326    1327    ..   1429

© SecPod Technologies