[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248585

 
 

909

 
 

195621

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26115 Download | Alert*

Windows DNS Server Remote Code Execution Vulnerability. Successful exploitation of this vulnerability requires an attacker to win a race condition.

Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability. On successful exploitation, there could be a loss of confidentiality if an unaware user clicked on a popup therefore creating an opportunity for an attacker to retrieve cookies or present the user with a dialog box to enter user credentials.

Windows Local Security Authority (LSA) Denial of Service Vulnerability. Successful exploitation of this vulnerability requires that an attacker will need to first gain access to the restricted network before running an attack.

Windows Deployment Services Denial of Service Vulnerability

Windows Deployment Services Remote Code Execution Vulnerability. An attacker with user permissions could alter specific variables in the CNTCIR Packet of the WDSMA protocol in order to exploit this vulnerability. For more information about CNTCIR Packet see CNTCIR Packet.

Windows Server Update Service (WSUS) Elevation of Privilege Vulnerability. An attacker who successfully exploited this vulnerability could gain administrator privileges.

Microsoft Outlook Security Feature Bypass Vulnerability.

Windows DNS Server Remote Code Execution Vulnerability. Successful exploitation of this vulnerability requires an attacker to win a race condition.

The host is installed with JetBrains YouTrack before 23.1.10518 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle Markdown-rendering engine. Successful exploitation could allow attackers to cause unpecified impact.

The host is installed with JetBrains YouTrack before 23.1.10518 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle Helpdesk forms. Successful exploitation could allow attackers to cause denial of service.


Pages:      Start    1578    1579    1580    1581    1582    1583    1584    1585    1586    1587    1588    1589    1590    1591    ..   2611

© SecPod Technologies