[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 195419 Download | Alert*

The host is installed with Microsoft Common Data Model SDK for Python before 1.7.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle issues in unspecified vectors. Successful exploitation allow authenticated attackers to trigger this vulnerability and cause denial of service.

The host is installed with Azure DevOps Server 2022, or 2020 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle issues in unspecified vectors. Successful exploitation could allow an attacker to gain access to the secrets of the user of the affected application.

Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability. The type of information that could be disclosed if an attacker successfully exploited this vulnerability is sensitive information. Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges.

Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability. The type of information that could be disclosed if an attacker successfully exploited this vulnerability is sensitive information. Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges.

The host is missing an important security update for KB5031500

The host is missing an important security update for KB5031499

Microsoft SQL ODBC Driver Remote Code Execution Vulnerability. An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via a connection driver.

Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability. An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via a connection driver.

The host is installed with Microsoft Azure RTOS GUIX Studio before 6.3.0 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.

Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability. On successful exploitation, the attacker is only able to modify the content of the vulnerable link to redirect the victim to a malicious site. Limited information from the victim's browser associated with the vulnerable URL can be sent to the attacker by the malicious code.


Pages:      Start    10457    10458    10459    10460    10461    10462    10463    10464    10465    10466    10467    10468    10469    10470    ..   19541

© SecPod Technologies