[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 27003 Download | Alert*

The host is installed with Symantec LiveUpdate Administrator before 2.3.1 and is prone to privilege-escalation vulnerability. A flaw is present in the application, which uses weak permissions for the installation directory. Successful exploitation allows local users to gain privileges via a Trojan horse file.

The host is installed with PrivaWall Antivirus before 5.6 Build 2354 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a crafted file embedded in a WordML document. Successful exploitation could allow attackers to bypass malware detection.

The host is installed with WellinTech KingSCADA 3.0 and is prone to information disclosure vulnerability. A flaw is present in the application, which uses a cleartext base64 format for storage of passwords in user.db. Successful exploitation allows context-dependent attackers to obtain sensitive information by reading this file.

The host is installed with OpenSSH 6.2 or 6.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle an issue in mm_newkeys_from_blob function in monitor_wrap.c in sshd. Successful exploitation could allow remote authenticated users to bypass intended ForceCommand and login-shell restrictions via packet data that provides a crafted cal ...

The host is installed with WSO2 API Manager 2.6.0 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle an issue in file upload component. Successful exploitation could allow attackers to upload any type of file by changing the extension to an allowed one.

An information disclosure vulnerability exists in Microsoft SharePoint when an attacker uploads a specially crafted file to the SharePoint Server. An authenticated attacker who successfully exploited this vulnerability could potentially leverage SharePoint functionality to obtain SMB hashes. The security update addresses the vulnerability by correcting how SharePoint checks file content.

An information disclosure vulnerability exists in SharePoint Server. An attacker who exploited this vulnerability could read arbitrary files on the server. To exploit the vulnerability, an attacker would need to send a specially crafted request to a susceptible SharePoint Server instance.

The host is installed with Nvidia graphics driver with 460.x prior to 461.09 and is prone to a denial of service vulnerability. A flaw is present in the kernel mode layer (nvlddmkm.sys) handler, which fails to properly handle unknown vector. Successful exploitation may allow attackers to cause denial of service.

The host is installed with VMware Workstation 15.x before 15.5.0, VMware Player 15.x before 15.5.0 and is prone to denial-of-service vulnerability vulnerability. An attacker may exploit this issue by sending a specially crafted IPv6 packet from a guest machine on the VMware NAT to disallow network access for all guest machines using VMware NAT mode.

The host is installed with MediaChance Real-DRAW PRO 5.2.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle crafted files. Successful exploitation could allow attackers to crash the service.


Pages:      Start    2614    2615    2616    2617    2618    2619    2620    2621    2622    2623    2624    2625    2626    2627    ..   2700

© SecPod Technologies