[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31089 Download | Alert*

Dynamics 365 Sales Spoofing Vulnerability. The vulnerability is in the web server, but the malicious scripts execute in the victim's browser on their machine. The attacker is only able to modify the content of the vulnerable link to redirect the victim to a malicious site.

The host is installed with Azure Connected Machine agent before 1.38 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to add symlinks and cause an arbitrary file delete as SYSTEM.

Windows Kernel Elevation of Privilege Vulnerability. An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.

Windows Kernel Information Disclosure Vulnerability. An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.

Windows DNS Client Denial of Service Vulnerability

Windows Kernel Remote Code Execution Vulnerability

Windows Network Address Translation (NAT) Denial of Service Vulnerability

Windows Network Address Translation (NAT) Denial of Service Vulnerability. Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment.

Windows Kernel Elevation of Privilege Vulnerability. An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. An authenticated attacker could run a specially crafted application that would give them control of the targeted destination and source of the copy.

Internet Connection Sharing (ICS) Denial of Service Vulnerability


Pages:      Start    13    14    15    16    17    18    19    20    21    22    23    24    25    26    ..   3108

© SecPod Technologies