[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

251782

 
 

909

 
 

196543

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 195805 Download | Alert*

Windows DNS Server Remote Code Execution Vulnerability. Successful exploitation of this vulnerability requires an attacker to win a race condition. Successful exploitation of this vulnerability requires the attacker or targeted user to have specific elevated privileges. As is best practice, regular validation and audits of administrative groups should be conducted.

Windows DNS Server Remote Code Execution Vulnerability. Successful exploitation of this vulnerability requires an attacker to win a race condition. Successful exploitation of this vulnerability requires the attacker or targeted user to have specific elevated privileges. As is best practice, regular validation and audits of administrative groups should be conducted.

Windows DNS Server Remote Code Execution Vulnerability. Successful exploitation of this vulnerability requires an attacker to win a race condition. Successful exploitation of this vulnerability requires the attacker or targeted user to have specific elevated privileges. As is best practice, regular validation and audits of administrative groups should be conducted.

Windows DNS Server Remote Code Execution Vulnerability. Successful exploitation of this vulnerability requires an attacker to win a race condition. Successful exploitation of this vulnerability requires the attacker or targeted user to have specific elevated privileges. As is best practice, regular validation and audits of administrative groups should be conducted.

DHCP Server Service Remote Code Execution Vulnerability. An authenticated attacker could leverage a specially crafted RPC call to the DHCP service to exploit this vulnerability. Successful exploitation of this vulnerability requires that an attacker will need to first gain access to the restricted network before running an attack.

The host is installed with Apple Mac OS 11 before 11.7.3 or Apple Mac OS 12 before 12.6.3 and is prone to an access vulnerability. The flaws are present in the application which fails to properly handle issues in improved access restrictions. On successful exploitation, an app may be able to access mail folder attachments through a temporary directory used during compression.

The host is installed with Apple Mac OS 12 before 12.6.6 or Apple Mac OS 13 before 13.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle issues in additional permissions checks. On successful exploitation, a sandboxed app may be able to observe system-wide network connections.

The host is installed with Apple Mac OS 11 before 11.7.7 or Apple Mac OS 12 before 12.6.6 and is prone to a security bypass vulnerability. A flaw is present in the application which fails to handle issues in entitlements. On successful exploitation, a sandboxed app may be able to collect system logs.

The host is installed with Apple Mac OS 11 before 11.7.7, Apple Mac OS 12 before 12.6.6 or Apple Mac OS 13 before 13.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle issues in redaction of sensitive information. On successful exploitation, an app may be able to bypass privacy preferences.

The host is installed with Apple Mac OS 11 before 11.7.7, Apple Mac OS 12 before 12.6.6 or Apple Mac OS 13 before 13.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle issues in checks. On successful exploitation, an app may bypass gatekeeper checks.


Pages:      Start    7957    7958    7959    7960    7961    7962    7963    7964    7965    7966    7967    7968    7969    7970    ..   19580

© SecPod Technologies