[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 1180 Download | Alert*

The host is installed with Dell Command Update before 4.2.1 and is prone to a link following vulnerability. A flaw is present in the application, which fails to properly handle issues in unspecified vectors. Successful exploitation could leads to creating a symlink to a target file, allowing the attacker to overwrite or corrupt a specified file on the system.

The host is installed with Dell Command Update before 4.11.0 and is prone to an improper access control vulnerability. A flaw is present in the application, which fails to properly handle issues in unspecified vectors. Successful exploitation could leads to modify files inside installation folder during application upgrade, leading to privilege escalation.

The host is installed with Dell Command Update before 4.11.0 and is prone to an improper access control vulnerability. A flaw is present in the application, which fails to properly handle issues in unspecified vectors. Successful exploitation could leads to potentially exploit this vulnerability while repairing/changing installation, leading to privilege escalation.

Dell Command Configure is installed

The host is installed with Microsoft Edge before 124.0.2478.51 and is prone to a security feature bypass vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Microsoft Edge before 124.0.2478.51 and is prone to a security feature bypass vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is missing a critical security update according to Adobe advisory, APSB24-26. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle unspecified vectors. Successful exploitation could lead to multiple impacts.

The host is installed with Adobe Animate 23.0.x before 23.0.5, or 24.0.x before 24.0.2 and is prone to a NULL pointer dereference vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause application denial-of-service.

The host is installed with Adobe Animate 23.0.x before 23.0.5, or 24.0.x before 24.0.2 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause memory leak.

The host is installed with Adobe Animate 23.0.x before 23.0.5, or 24.0.x before 24.0.2 and is prone to an integer overflow or wraparound vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause arbitrary code execution.


Pages:      Start    61    62    63    64    65    66    67    68    69    70    71    72    73    74    ..   117

© SecPod Technologies