[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26748 Download | Alert*

Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability. On successful exploitation, information in the victim's browser associated with the vulnerable URL can be read by the malicious JavaScript code and sent to the attacker.

Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability. On successful exploitation, information in the victim's browser associated with the vulnerable URL can be read by the malicious JavaScript code and sent to the attacker.

Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability. On successful exploitation, information in the victim's browser associated with the vulnerable URL can be read by the malicious JavaScript code and sent to the attacker.

Microsoft Dynamics 365 (on-premises) Information Disclosure Vulnerability. This vulnerability causes a verbose error message that could provide attacker with enough information to construct a malicious payload.

The host is installed with Visual Studio 2017 or 2019 or 2022 and is prone to a spoofing vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause unspecified impact.

The host is installed with Visual Studio 2017 or 2019 or 2022 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause unspecified impact.

The host is installed with Visual Studio 2022 or .NET core runtime and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to gain the rights of the user that is running the affected application.

The host is installed with Python before 3.6.13, 3.7.x before 3.7.10, 3.8.x before 3.8.7, or 3.9.x before 3.9.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an issue in read_ints in plistlib.py. Successful exploitation allows attackers to lead to a potential DoS attack via CPU and RAM exhaustion when processing malformed Ap ...

The host is installed with Azure Connected Machine agent before 1.37 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to add symlinks and cause an arbitrary file delete as SYSTEM.

The host is installed with Azure Mltable SDK for Python before 1.5.0 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle issues in unspecified vectors. Successful exploitation allow attackers to leak user's data.


Pages:      Start    1119    1120    1121    1122    1123    1124    1125    1126    1127    1128    1129    1130    1131    1132    ..   2674

© SecPod Technologies