[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31294 Download | Alert*

The host is installed with MOVEit Transfer 2021.1.x before 2021.1.8 (13.1.8), 2022.0.x before 2022.0.8 (14.0.8), 2022.1.x before 2022.1.9 (14.1.9), 2023.0.0 before 2023.0.6 (15.0.6) and is prone to a reflected cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle MOVEit Transfer's web interface. Successful exploitation could allow an attacker to c ...

The host is installed with MOVEit Transfer 2021.1.x before 2021.1.8 (13.1.8), 2022.0.x before 2022.0.8 (14.0.8), 2022.1.x before 2022.1.9 (14.1.9), 2023.0.0 before 2023.0.6 (15.0.6) and is prone to a SQL injection vulnerability. A flaw is present in the application, which fails to properly handle MOVEit Transfer machine interface. Successful exploitation could allow an authenticated attacker to ga ...

The host is installed with MOVEit Transfer 2022.0.x before 2022.0.9 (14.0.9), 2022.1.x before 2022.1.10 (14.1.10), 2023.0.0 before 2023.0.7 (15.0.7) and is prone to a reflected cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle MOVEit Gateway is used in conjunction with MOVEit Transfer. Successful exploitation could allow attackers to execute ...

The host is installed with MOVEit Transfer 2022.0.x before 2022.0.9 (14.0.9), 2022.1.x before 2022.1.10 (14.1.10), 2023.0.0 before 2023.0.7 (15.0.7) and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle group administrators. Successful exploitation could allow a group administrator to elevate a group members permission to the rol ...

The host is installed with Dell Command Update Windows Universal before 4.6.0 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle issues in custom catalog configuration. Successful exploitation could lead to unspecified impacts.

The host is installed with Dell Command Update 4.6.0 before 4.7.1 and is prone to an insecure operation on windows junction vulnerability. A flaw is present in the application, which fails to properly handle issues in the installer component. Successful exploitation could allow attackers to delete arbitrary files.

The host is installed with Dell Command Update before 4.7.1 and is prone to an unauthorized control sphere vulnerability. A flaw is present in the application, which fails to properly handle issues in download operation component. Successful exploitation could leads to information disclosure.

The host is installed with Dell Command Update before 4.7.1 and is prone to an improper verification of cryptographic signature vulnerability. A flaw is present in the application, which fails to properly handle issues in get applicable driver component. Successful exploitation could allow attackers to execute payloads.

The host is installed with Dell Command Update Windows Universal before 4.5.0 or Alienware Update Windows Universal before 4.5.0 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle issues in advanced driver restore component. On successful exploitation, a local malicious user may potentially exploit this vulnerability, leading ...

The host is installed with Dell Command Update Windows Universal before 4.9.0 or Alienware Update Windows Universal before 4.9.0 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle issues in Windows Junction/Mount Point. On successful exploitation, a local malicious user could potentially exploit this vulnerability leading to p ...


Pages:      Start    1351    1352    1353    1354    1355    1356    1357    1358    1359    1360    1361    1362    1363    1364    ..   3129

© SecPod Technologies