[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26616 Download | Alert*

The host is installed with Visual Studio and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause unspecified impact.

The host is installed with Visual Studio and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause unspecified impact.

The host is installed with Visual Studio and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause unspecified impact.

The host is installed with Visual Studio and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause unspecified impact.

An elevation of privilege vulnerability exists when the Visual Studio Extension Installer Service improperly handles file operations. An attacker who successfully exploited the vulnerability could delete files in arbitrary locations with elevated permissions. To exploit the vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted applicati ...

An information disclosure vulnerability exists when Visual Studio improperly parses XML input in certain settings files. An attacker who successfully exploited this vulnerability could read arbitrary files via an XML external entity (XXE) declaration.To exploit the vulnerability, an attacker could create specially crafted XML data and convince an authenticated user to open the file.The update addr ...

An information disclosure vulnerability exists when Visual Studio improperly discloses limited contents of uninitialized memory while compiling program database (PDB) files. An attacker who took advantage of this information disclosure could view uninitialized memory from the Visual Studio instance used to compile the PDB file. To take advantage of the vulnerability, an attacker would require acce ...

The host is installed with Apache HTTP Server 2.2.x through 2.2.27 or 2.4.x through 2.4.10 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a crafted data. Successful exploitation could allow remote attackers to bypass "RequestHeader unset" directives by placing a header in the trailer portion of data sent with chunked transfer c ...

The host is installed with Apache HTTP Server 2.4.10 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle long response headers. Successful exploitation could allow remote FastCGI servers to cause a denial of service (buffer over-read and daemon crash) via long response headers.

The host is installed with Apache HTTP Server 2.4.12 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly initialize the protocol structure member. Successful exploitation could allow remote attackers to cause a denial of service (NULL pointer dereference and process crash).


Pages:      Start    1127    1128    1129    1130    1131    1132    1133    1134    1135    1136    1137    1138    1139    1140    ..   2661

© SecPod Technologies