[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26503 Download | Alert*

A denial of service vulnerability exists when ASP.NET Core improperly handles web requests. An attacker who successfully exploited this vulnerability could cause a denial of service against a ASP.NET Core web application. The vulnerability can be exploited remotely, without authentication.

An elevation of privilege vulnerability exists when a ASP.NET Core web application, created using vulnerable project templates, fails to properly sanitize web requests. An attacker who successfully exploited this vulnerability could perform content injection attacks and run script in the security context of the logged-on user.

A Cross Site Request Forgery (CSRF) vulnerability exists when a ASP.NET Core web application is created using vulnerable project templates. An attacker who successfully exploited this vulnerability could change the recovery codes associated with the victim's user account without his/her consent. As a result, a victim of this attack may be permanently locked out of his/her account after loosing acc ...

An open redirect vulnerability exists in ASP.NET Core that could lead to elevation of privilege. To exploit the vulnerability, an attacker could send a link that has a specially crafted URL, and convince the user to click the link.

A Security Feature Bypass vulnerability exists in ASP.NET when the number of incorrect login attempts is not validated. An attacker who successfully exploited this vulnerability could try an infinite number of authentication attempts. The update addresses the vulnerability by validating the number of incorrect login attempts.

An information disclosure vulnerability exists in ASP.NET Core that allows bypassing cross-origin resource sharing(CORS) configurations. An attacker who successfully exploited the vulnerability could retrieve content, that is normally restricted, from a web application.

Dell BIOS contains an Improper Input Validation vulnerability. An unauthenticated physical attacker may potentially exploit this vulnerability to perform arbitrary code execution.

The host is installed with the VMware Workstation 14.x before 14.1.6, 15.x before 15.0.3 or VMware Player 14.x before 14.1.6, 15.x before 15.0.3 and is prone to an out-of-bounds write vulnerability. The application fails to handle the issue in e1000 and e1000e virtual network adapters. Successful exploitation of this issue may lead to code execution on the host from the guest but it is more likely ...

The host is installed with the VMware Workstation 14.x before 14.1.7 or VMware Player 14.x before 14.1.7 and is prone to an out-of-bounds write vulnerability. The application fails to handle the issue in e1000 virtual network adapter. Successful exploitation of this issue may allow a guest to execute code on the host.

The host is installed with the VMware Workstation 14.x before 14.1.7, 15.x before 15.0.4 or VMware Player 14.x before 14.1.7, 15.x before 15.0.4 and is prone to an out-of-bounds read/write vulnerability. The application fails to properly handle the virtual USB controller. Successful exploitation of this issue may allow a guest to execute code on the host.


Pages:      Start    1275    1276    1277    1278    1279    1280    1281    1282    1283    1284    1285    1286    1287    1288    ..   2650

© SecPod Technologies