[Forgot Password]
Login  Register Subscribe

24436

 
 

131815

 
 

115228

 
 

909

 
 

90122

 
 

140

 
 
Paid content will be excluded from the download.

Filter
Matches : 13850 Download | Alert*

A remote code execution vulnerability exists in Microsoft Exchange software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the System user. An attacker could then install programs; view, change, or delete data; or create new accounts.

A tampering vulnerability exists when Microsoft Exchange Server fails to properly handle profile data. An attacker who successfully exploited this vulnerability could modify a targeted user's profile data. To exploit the vulnerability, an attacker would need to be authenticated on an affected Exchange Server. The attacker would then need to send a specially modified request to the server, targetin ...

A Tampering vulnerability exists when Microsoft Macro Assembler improperly validates code. An attacker could introduce code into an application, which modifies data in an unintended manner. The security updates addresses the vulnerability by ensuring that Microsoft Macro Assembler properly validates code logic.

A remote code execution vulnerability exists in Visual Studio software when the software does not check the source markup of a file for an unbuilt project. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An at ...

The host is installed with Cisco WebEx extensions for Google Chrome before before 1.0.7, Mozilla Firefox before 106 or Internet Explorer before 2.1.0.10 and is prone to a Cisco WebEx browser extension remote code execution vulnerability. A flaw is present in the application, which fails to handle an application programing interface (API) response parser within the plugin. Successful exploitation a ...

The host is installed with Citrix Receiver through 3.2 along with Citrix Receiver Online plug-in through 12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a specially crafted malicious file from an SMB or WebDAV fileserver. Successful exploitation allows an attacker to execute arbitrary code on the client device in the conte ...

A buffer overflow vulnerability exists in the Microsoft SQL Server that could allow remote code execution on an affected system. An attacker who successfully exploited this vulnerability could execute code in the context of the SQL Server Database Engine service account. To exploit the vulnerability, an attacker would need to submit a specially crafted query to an affected SQL server.

The host is installed with Apple iTunes before 12.9.1 or Apple iCloud before 7.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fail to properly handle input validation. Successful exploitation could allow attackers to crash the service.

The host is installed with Apple iTunes before 12.9.1 or Apple iCloud before 7.8 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fail to properly handle input validation. Successful exploitation could allow attackers to crash the service.

The host is installed with Apple iTunes before 12.9.1 or Apple iCloud before 7.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fail to properly handle input validation. Successful exploitation could allow attackers to crash the service.


Pages:      Start    4    5    6    7    8    9    10    11    12    13    14    15    16    17    ..   1384

© SecPod Technologies