[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26099 Download | Alert*

The host is installed with LibreOffice 7.2.x before 7.2.7 or 7.3.x before 7.3.3 and is prone to an inadequate encryption strength vulnerability. A flaw is present in the application, which fails to properly handle issues in master key which was poorly encoded resulting in weakening its entropy from 128 to 43 bits making the stored passwords. Successful exploitation could allow attackers to gain ac ...

The host is installed with LibreOffice 7.3.x before 7.3.6 or 7.4.x before 7.4.1 and is prone to an improper input validation vulnerability. A flaw is present in the application, which fails to properly handle office URI schemes. Successful exploitation allows attackers to call internal macros with arbitrary arguments, which, when clicked on or activated by document events, may result in arbitrary ...

Windows Kerberos Elevation of Privilege Vulnerability. An attacker who successfully exploited this vulnerability could gain administrator privileges. An authenticated attacker could leverage cryptographic protocol vulnerabilities in Windows Kerberos. If the attacker gains control on the service that is allowed for delegation, they can modify the Kerberos PAC to elevate their privileges.

Microsoft Outlook Information Disclosure Vulnerability

Microsoft SharePoint Elevation of Privilege Vulnerability

Microsoft SharePoint Remote Code Execution Vulnerability

The host is installed with Azure DevOps Server products and is prone to a spoofing vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow an attacker to perform spoofing attacks.

The host is installed with Microsoft Exchange Server products and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle improper validation of cmdlet arguments. Successful exploitation could allow an attacker to obtain sensitive information.

The host is installed with visual studio code Remote-SSH extension before 0.61.0 and is prone to a remote code execution vulnerability. The flaws are present in the extension, which fails to handle unspecified vector. Successful exploitation could lead to arbitrary code execution.

The host is installed with Visual Studio and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow a remote attacker to execute code.


Pages:      Start    1069    1070    1071    1072    1073    1074    1075    1076    1077    1078    1079    1080    1081    1082    ..   2609

© SecPod Technologies