[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26316 Download | Alert*

Microsoft ODBC and OLE DB Remote Code Execution Vulnerability. An attacker could exploit the vulnerability by convincing a victim to download and open a specially crafted file and take control of an affected system.

Microsoft Publisher Remote Code Execution Vulnerability

Microsoft SharePoint Server Spoofing Vulnerability

Microsoft Publisher Remote Code Execution Vulnerability

Microsoft Office Remote Code Execution Vulnerability

The host is installed with Visual Studio 2019 or 2022 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cross the kernel security boundary and can lead to system information disclosure.

The host is installed with Visual Studio 2019 or 2022 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to gain administrator privileges.

The host is installed with Visual Studio 2022 or .NET core runtime 6.0 or .NET core runtime 7.0 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause unspecified impact.

The host is installed with Expo Software Development Kit 45.0.0 before 48.0.0 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle issue in the "Expo AuthSession Redirect Proxy". Successful exploitation allows an attacker to take over accounts and steal sensitive data like credentials.

The host is installed with Tightvnc version before 2.8.75 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fail to properly handle crafted files. Successful exploitation allows attackers to escalate privileges on the host operating system via replacing legitimate files with crafted files.


Pages:      Start    1610    1611    1612    1613    1614    1615    1616    1617    1618    1619    1620    1621    1622    1623    ..   2631

© SecPod Technologies