[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253390

 
 

909

 
 

197257

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26887 Download | Alert*

The host is installed with Visual Studio 2017 or 2019 or 2022 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause unspecified impact.

Azure Service Fabric Explorer Spoofing Vulnerability

Remote Procedure Call Runtime Remote Code Execution Vulnerability. To exploit this vulnerability, an unauthenticated attacker would need to send a specially crafted RPC call to an RPC host. This could result in remote code execution on the server side with the same permissions as the RPC service.

Microsoft Defender Elevation of Privilege Vulnerability. Successful exploitation of this vulnerability requires an attacker to win a race condition. This vulnerability does not allow disclosure of any confidential information, but could allow an attacker to delete data that could include data that results in the service being unavailable.

Windows Point-to-Point Protocol over Ethernet (PPPoE) Elevation of Privilege Vulnerability. An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.

Microsoft SharePoint Server Spoofing Vulnerability

Client Server Run-Time Subsystem (CSRSS) Information Disclosure Vulnerability. An attacker who successfully exploited this vulnerability could view heap memory from a privileged process running on the server.

Microsoft Outlook Elevation of Privilege Vulnerability

Microsoft Excel Spoofing Vulnerability.

Microsoft Excel Denial of Service Vulnerability


Pages:      Start    2    3    4    5    6    7    8    9    10    11    12    13    14    15    ..   2688

© SecPod Technologies