[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 197798 Download | Alert*

Insufficient granularity of access control in out-of-band management in some Intel Atom and Intel Xeon Scalable Processors may allow a privileged user to potentially enable escalation of privilege via adjacent network access. Incorrect calculation in microcode keying mechanism for some 3rd Generation Intel Xeon Scalable Processors may allow a privileged user to potentially enable information discl ...

The host is installed with Apple Mac OS 11 before 11.7 or Apple Mac OS 12 before 12.6 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle issues in enabling hardened runtime. On successful exploitation, a user may be able to view sensitive user information.

The host is installed with Google Chrome before 97.0.4692.71 and is prone to an inappropriate implementation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 97.0.4692.71 and is prone to an inappropriate implementation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 97.0.4692.71 and is prone to an inappropriate implementation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 97.0.4692.71 and is prone to an inappropriate implementation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

Microsoft OneNote 2016 is installed

An information disclosure vulnerability exists in Visual Studio Code Live Share Extension when it exposes tokens in plain text. To exploit the vulnerability, an attacker would need to perform a successful capture of the tokens from client to proxy, where specific proxy settings are being used, making this very difficult to exploit. The update address the vulnerability by modifying the way Visual S ...

Visual Studio Code Live Share extension (64 bit) is installed

Azure Connected Machine agent is installed


Pages:      Start    11219    11220    11221    11222    11223    11224    11225    11226    11227    11228    11229    11230    11231    11232    ..   19779

© SecPod Technologies