[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14298 Download | Alert*

The host is installed with xArrow before 3.4.1 and is prone to integer overflow vulnerability. A flaw is present in the application, which fails to perform proper bounds check. Successful exploitation allows remote attackers to execute arbitrary code via a crafted packet that triggers an out-of-bounds read operation.

The host is installed with xArrow before 3.4.1 and is prone to a NULL pointer dereference vulnerability. A flaw is present in the application, which fails to properly allocate memory. Successful exploitation allows remote attackers to cause a denial of service.

The host is installed with WellinTech KingHistorian 3.0 and is prone to an invalid pointer write vulnerability. A flaw is present in the application, which fails to handle a crafted packet. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Winlog Lite SCADA or Winlog Pro SCADA before 2.07.18 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a packet with a crafted negative integer after the opcode. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Winlog Lite SCADA or Winlog Pro SCADA before 2.07.17 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a packet with a crafted positive integer after the opcode. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Novell messenger 2.1 or 2.2.x before 2.2, Groupwise Messenger 2.0.4 or earlier and is prone to memory disclosure vulnerability. A flaw is present in the application, which fails to handle a crafted command that would force the Messenger server process to return the contents of arbitrary memory locations, Successful exploitation allows remote attackers to read from arbitr ...

The host is installed with Oracle VM VirtualBox 5.0.x before 5.0.28 or 5.1.x before 5.1.8 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation can result in unauthorized read access to a subset of Oracle VM VirtualBox accessible data.

The host is installed with Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6.0 or 12.1.3.0 and is prone to a remote security vulnerability. A flaw is present in the application, which fails to properly handle HTTP requests. Successful exploitation allows unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data.

The host is installed with Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6.0, 12.1.3.0, 12.2.1.1 or 12.2.1.2 and is prone to a remote information disclosure vulnerability. A flaw is present in the application, which fails to properly handle HTTP requests. Successful exploitation allows an attacker to give permission to an unauthorized read access to a subset of Oracle WebLogic ...

An information disclosure vulnerability exists in Outlook when a message is opened. This vulnerability could potentially result in the disclosure of sensitive information to a malicious site. To exploit the vulnerability, an attacker would have to send a malicious email to a user and convince the user to open the email. A connection to a remote SMB server could then be automatically initiated, ena ...


Pages:      Start    1374    1375    1376    1377    1378    1379    1380    1381    1382    1383    1384    1385    1386    1387    ..   1429

© SecPod Technologies