[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26831 Download | Alert*

Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability. The type of information that could be disclosed if an attacker successfully exploited this vulnerability is sensitive information. Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges.

Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability. The type of information that could be disclosed if an attacker successfully exploited this vulnerability is sensitive information. Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges.

Microsoft SQL ODBC Driver Remote Code Execution Vulnerability. An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via a connection driver.

Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability. An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via a connection driver.

Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability. On successful exploitation, the attacker is only able to modify the content of the vulnerable link to redirect the victim to a malicious site. Limited information from the victim's browser associated with the vulnerable URL can be sent to the attacker by the malicious code.

The host is installed with Azure Identity SDK for Python before 1.14.1 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly handle issues in unspecified vectors. Successful exploitation allow attackers to gain high privileges, which include read, write, and delete functionality.

The host is installed with PaperCut NG 20.0.0 before 20.1.9 or 21.0.0 before 21.2.13 or 22.0.0 before 22.1.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle issues in application servers. Successful exploitation could allow an unauthenticated attacker with direct server IP access to upload arbitrary files into a target directo ...

The host is installed with VMware Workstation 17.x before 17.5 or or VMware Player 17.x before 17.5 and is prone to an information disclosure read vulnerability. A flaw is present in the application, which fails to properly handle issues in the functionality for sharing host Bluetooth devices. Successful exploitation could allow attackers with local administrative privileges on a virtual machine t ...

The host is installed with Adobe Photoshop 2022 through 23.5.5, or 2023 before 24.7.1 and is prone to an access of uninitialized pointer vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to cause arbitrary code execution.

The host is installed with Adobe Creative Cloud before 5.10 and is prone to an untrusted search path vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code.


Pages:      Start    1646    1647    1648    1649    1650    1651    1652    1653    1654    1655    1656    1657    1658    1659    ..   2683

© SecPod Technologies