[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

251782

 
 

909

 
 

196543

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31422 Download | Alert*

Windows Digital TV Tuner device registration application Elevation of Privilege Vulnerability

Microsoft Dynamics Business Central Cross-site Scripting Vulnerability.

Windows Recovery Environment Agent Elevation of Privilege Vulnerability

The host is installed with Microsoft Dynamics 365 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow an attacker to perform cross-site scripting attacks.

Microsoft Azure AD Connect Authentication Bypass Vulnerability. The attacker must be able to establish Man-in-the-middle between your Azure AD Connect server and a domain controller. The attacker also needs to possess domain user credentials to be able to exploit this vulnerability. In addition to applying the updates in this CVE, you will need to disable NTLM as per the guidance.

The host is installed with Microsoft Visual Studio and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow an unspecified impact.

The host is installed with Visual Studio code before 1.59.1 and is prone to a spoofing vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to perform spoofing attacks.

The host is installed with Microsoft Visual Studio and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow an unspecified impact.

Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability

The host is installed with MPEG-2 Video Extension before 1.0.42152.0 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow a remote attacker to execute arbitrary code.


Pages:      Start    1351    1352    1353    1354    1355    1356    1357    1358    1359    1360    1361    1362    1363    1364    ..   3142

© SecPod Technologies