[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26099 Download | Alert*

DHCP Server Service Denial of Service Vulnerability. Customers who have not configured their DHCP server as a failover are not affected by this vulnerability.

The host is installed with Atlassian Confluence Server before 7.19.16, 8.0.0 before 8.3.4, 8.4.0 before 8.4.4, 8.5.0 before 8.5.3, or 8.6.0 before 8.6.1 and is prone to an improper authorization vulnerability. A flaw is present in the application which fails to properly handle unspecified vectors. Successful exploitation allows an unauthenticated attacker to cause significant data loss.

Microsoft Word Information Disclosure Vulnerability.

Windows DNS Spoofing Vulnerability

DHCP Server Service Denial of Service Vulnerability

DHCP Server Service Information Disclosure Vulnerability. The type of information that could be disclosed if an attacker successfully exploited this vulnerability is remote heap memory.

DHCP Server Service Information Disclosure Vulnerability. The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory. An attacker who successfully exploited the vulnerability could view some sensitive information (Confidentiality) but not all resources within the impacted component may be divulged to the attacker. The attacker c ...

The host is installed with Azure DevOps Server 2022, or 2020 and is prone to a spoofing vulnerability. A flaw is present in the application, which fails to handle a user account in the organization with the ability to run builds. Successful exploitation compromises the integrity of the build verification process, allowing an attacker to spoof and bypass verification.

The host is installed with JetBrains YouTrack before 23.3.22268 and is prone to an improper authorization vulnerability. A flaw is present in the application, which is fails to properly handle an authorization check issue. Successful exploitation could allow attackers to make the users miss the authorization check for inline comments inside thread replies.

The host is installed with Nvidia graphics driver with 470.x prior to 474.44 or 535.x prior to 536.23 and is prone to an unknown vulnerability. A flaw is present in the application which fails to properly handle data parsing. Successful exploitation may leads to code execution, denial of service, escalation of privileges, data tampering, or information disclosure.


Pages:      Start    1108    1109    1110    1111    1112    1113    1114    1115    1116    1117    1118    1119    1120    1121    ..   2609

© SecPod Technologies