[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250053

 
 

909

 
 

195940

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31297 Download | Alert*

The host is installed with Visual Studio code before 1.77.2 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows remote attackers to execute arbitrary code.

The host has Teams Javascript SDK library v1.x less than 1.13.1 or v2.x less than 2.10.1. A flaw is present in the application which fails to handle unspecified vectors. Successful exploitation could allow attackers to gain sensitive information.

The host is installed with Citrix Workspace App before 2212, 2203 LTSR before CU2 or 1912 LTSR before CU7 Hotfix 2 and is prone to an improper access control vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. On successful exploitation, a malicious user can cause log files to be written to a directory that they do not have permission to write to.

The host is installed with Citrix Workspace App before 2212, 2203 LTSR before CU2 or 1912 LTSR before CU7 Hotfix 2 and is prone to an improper access control vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. On successful exploitation, privilege escalation on the system running a vulnerable version of Citrix Workspace app for Windows.

The host is installed with IrfanView 4.60 and is prone to an improper input validation vulnerability. A flaw is present in the application, which fails to handle a issues in the PDF.dll plugin. Successful exploitation could allow attackers to execute arbitrary code via opening a crafted PDF file.

Microsoft Excel Spoofing Vulnerability.

Windows DNS Server Remote Code Execution Vulnerability. Successful exploitation of this vulnerability requires the attacker or targeted user to have specific elevated privileges. As is best practice, regular validation and audits of administrative groups should be conducted.

Microsoft Outlook Elevation of Privilege Vulnerability

Microsoft Excel Spoofing Vulnerability.

Microsoft SharePoint Server Spoofing Vulnerability


Pages:      Start    1855    1856    1857    1858    1859    1860    1861    1862    1863    1864    1865    1866    1867    1868    ..   3129

© SecPod Technologies