[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249982

 
 

909

 
 

195748

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26202 Download | Alert*

The host is installed with LibreOffice 6.3.x before 6.3.6 or 6.4.x before 6.4.3 and is prone to a missing encryption vulnerability. A flaw is present in the application, which fails to handle encryption of auto-saved non ODF file format upon subsequent saves after crash. Successful exploitation could leak sensitive data.

The host is installed with LibreOffice 6.4.x before 6.4.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle remote graphic links loaded from docx documents were not in stealth mode by default. Successful exploitation could leak sensitive data.

The host is installed with LibreOffice 6.4.x before 6.4.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle Form Handler component. Successful exploitation could lead to privilege escalation.

An elevation of privilege vulnerability exists when the OneDrive for Windows Desktop application improperly handles symbolic links. An attacker who successfully exploited this vulnerability could overwrite a targeted file with an elevated status. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that coul ...

An elevation of privilege vulnerability exists when the OneDrive for Windows Desktop application improperly handles symbolic links. An attacker who successfully exploited this vulnerability could overwrite a targeted file with an elevated status. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that coul ...

An elevation of privilege vulnerability exists when the OneDrive for Windows Desktop application improperly handles symbolic links. An attacker who successfully exploited this vulnerability could overwrite a targeted file with an elevated status. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that coul ...

A remote code execution vulnerability exists in Visual Studio when it improperly handles objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change ...

A remote code execution vulnerability exists in Visual Studio when it improperly handles objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change ...

A remote code execution vulnerability exists in Visual Studio Code when a user is tricked into opening a malicious 'package.json' file. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then in ...

A security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded cookie names. The ASP.NET Core cookie parser decodes entire cookie strings which could allow a malicious attacker to set a second cookie with the name being percent encoded. The security update addresses the vulnerability by fixing the way the ASP.NET Core cookie parser handles encoded names.


Pages:      Start    1065    1066    1067    1068    1069    1070    1071    1072    1073    1074    1075    1076    1077    1078    ..   2620

© SecPod Technologies