[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250363

 
 

909

 
 

196124

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26307 Download | Alert*

Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability. On successful exploitation, information in the victim's browser associated with the vulnerable URL can be read by the malicious JavaScript code and sent to the attacker.

Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability. On successful exploitation, information in the victim's browser associated with the vulnerable URL can be read by the malicious JavaScript code and sent to the attacker.

Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability. On successful exploitation, information in the victim's browser associated with the vulnerable URL can be read by the malicious JavaScript code and sent to the attacker.

Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability. On successful exploitation, information in the victim's browser associated with the vulnerable URL can be read by the malicious JavaScript code and sent to the attacker.

Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability. On successful exploitation, information in the victim's browser associated with the vulnerable URL can be read by the malicious JavaScript code and sent to the attacker.

Microsoft Dynamics 365 (on-premises) Information Disclosure Vulnerability. This vulnerability causes a verbose error message that could provide attacker with enough information to construct a malicious payload.

The host is installed with Visual Studio 2017 or 2019 or 2022 and is prone to a spoofing vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause unspecified impact.

The host is installed with Visual Studio 2017 or 2019 or 2022 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause unspecified impact.

The host is installed with Visual Studio 2022 or .NET core runtime and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to gain the rights of the user that is running the affected application.

The host is installed with Python before 3.6.13, 3.7.x before 3.7.10, 3.8.x before 3.8.7, or 3.9.x before 3.9.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an issue in read_ints in plistlib.py. Successful exploitation allows attackers to lead to a potential DoS attack via CPU and RAM exhaustion when processing malformed Ap ...


Pages:      Start    1152    1153    1154    1155    1156    1157    1158    1159    1160    1161    1162    1163    1164    1165    ..   2630

© SecPod Technologies