[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

251782

 
 

909

 
 

196543

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31422 Download | Alert*

The host is installed with Team Foundation Server 2018 Update 1.1 or Update 3 and is prone to a remote code execution vulnerability. The application fails to handle issues in authorization between TSF and search services. On successful exploitation, an attacker could run certain commands on the search service without basic authorization.

A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the SharePoint application pool and the SharePoint server farm account. Exploitation of this vulnerability requires that a user uploads a specially craft ...

An elevation of privilege vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server. The attacker who successfully exploited the vulnerability could then perform cross-site scriptin ...

A Cross-site Scripting (XSS) vulnerability exists when Team Foundation Server does not properly sanitize user provided input. An authenticated attacker could exploit the vulnerability by sending a specially crafted payload to the Team Foundation Server, which will get executed in the context of the user every time a user visits the compromised page. The attacker who successfully exploited the vuln ...

A Cross-site Scripting (XSS) vulnerability exists when Team Foundation Server does not properly sanitize user provided input. An authenticated attacker could exploit the vulnerability by sending a specially crafted payload to the Team Foundation Server, which will get executed in the context of the user every time a user visits the compromised page. The attacker who successfully exploited the vuln ...

The host is installed with Xunlei Thunder before 7.2.6 and is prone to DLL injection vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation allows remote attackers to execute arbitrary code.

A Cross-site Scripting (XSS) vulnerability exists when Team Foundation Server does not properly sanitize user provided input. An authenticated attacker could exploit the vulnerability by sending a specially crafted payload to the Team Foundation Server, which will get executed in the context of the user every time a user visits the compromised page. The attacker who successfully exploited the vuln ...

A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server. The attacker who successfully exploited the vulnerability could then perform cross-site scrip ...

The host is installed with RealNetworks Helix Server or Helix Server or Helix Mobile Server 14.x before 14.3.x and is prone to multiple cross-site scripting (XSS) vulnerabilities. The flaws are present in the application, which fails to properly filter HTML code from user-supplied input before displaying the input. Successful exploitation allows remote attackers to inject arbitrary web script or H ...

The host is installed with Comodo Internet Security before 5.10.228257.2253 on Windows 7 x64 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted 32-bit Portable Executable (PE) file with a kernel ImageBase value. Successful exploitation could allow attackers to crash the service.


Pages:      Start    3070    3071    3072    3073    3074    3075    3076    3077    3078    3079    3080    3081    3082    3083    ..   3142

© SecPod Technologies