[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31160 Download | Alert*

Microsoft Excel Denial of Service Vulnerability

Azure Service Fabric Explorer Spoofing Vulnerability

The host is installed with SQL Server and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Visual Studio 2017 or 2019 or 2022 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause unspecified impact.

The host is installed with Microsoft Print 3D before 20.0.3.0 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to execute code remotely.

Microsoft ODBC and OLE DB Remote Code Execution Vulnerability. An attacker could exploit the vulnerability by convincing a victim to download and open a specially crafted file and take control of an affected system.

The host is installed with Visual Studio 2017 or 2019 or 2022 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attacker to gain the rights of the user that is running the affected application.

The host is installed with Atlassian Confluence Server 8.0.0 before 8.3.2 and is prone to a remote code execution vulnerability. A flaw is present in the application which fails to properly handle issue in unspecified vectors. Successful exploitation allows an authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availab ...

The host is installed with Atlassian Bamboo CI server before 9.2.3 or 9.3.0 through 9.3.1 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly handle an issue in the unspecified vectors. Successful exploitation could allows an authenticated attacker to modify the actions taken by a system call.

The host is installed with Atlassian Confluence Server before 7.13.17, 7.14.0 before 7.19.9, or 7.20.0 before 8.2.2 and is prone to a broken access control vulnerability. A flaw is present in the application which fails to properly handle attatchments feature. Successful exploitation allows remote attackers who have read permissions to a page, but not write permissions, to upload attachments.


Pages:      Start    1843    1844    1845    1846    1847    1848    1849    1850    1851    1852    1853    1854    1855    1856    ..   3115

© SecPod Technologies