[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31403 Download | Alert*

Microsoft Dynamics Business Central/NAV Information Disclosure Vulnerability. An information disclosure vulnerability exists when Microsoft Dynamics Business Central/NAV on-premise does not properly hide the value of a masked field when showing the records as a chart page.

The host is installed with Grails framework before 3.3.10 and is prone to a download of code without integrity check vulnerability. A flaw is present in the applications which fails to properly handle SDKMan notification service. Successful exploitation allows attackers to cause unspecified impact.

The host is installed with Malwarebytes 4.1.0.56 and is prone to improper link resolution before file access vulnerability. A flaw is present in the applications which fails to properly handle the local quarantine system. Successful exploitation allow remote attackers to delete an arbitrary file on the system.

The host is installed with Qbik Wingate 9.4.1.5998 and is prone an incorrect permission assignment for critical resource vulnerability. A flaw is present in the applications which fails to properly handle replacing an executable file. Successful exploitation allows local users to gain privileges by replacing an executable file with a Trojan horse.

The host is installed with NoMachine before 8.2.3 and is prone to an untrusted search path vulnerability. A flaw is present in the application, which fails to properly handle issues in Trojan horse wintab32.dll file. Successful exploitation could allow attackers to gain privileges via a Trojan horse wintab32.dll file located in the same directory as a .nxs file, as demonstrated by a scenario where ...

The host is installed with NoMachine before 5.3.26 or 6.0.0 before 6.0.80 and is prone to an improper initialization vulnerability. A flaw is present in the application, which fails to properly handle issues in Open Source DokanFS library. Successful exploitation could allow attackers to gain elevation of privileges on Windows 7 (32 and 64bit), and denial of service for Windows 8 and 10.

The host is installed with NoMachine before 6.4.6 and is prone to an use of uninitialized resource vulnerability. A flaw is present in the application, which fails to properly handle issues in nxfs.sys driver. Successful exploitation could allow attackers to cause a denial of service (BSOD) because uninitialized memory can be read.

The host is installed with NoMachine before 5.3.27 or 6.0.0 before 6.3.6 and is prone to an untrusted search path vulnerability. A flaw is present in the application, which fails to properly handle issues in Trojan horse wintab32.dll file. Successful exploitation could allow attackers to gain privileges via a Trojan horse wintab32.dll file located in the same directory as a .nxs file, as demonstra ...

The host is installed with Google Chrome before 88.0.4324.96 and is prone to an insufficient policy enforcement vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 88.0.4324.96 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.


Pages:      Start    1988    1989    1990    1991    1992    1993    1994    1995    1996    1997    1998    1999    2000    2001    ..   3140

© SecPod Technologies