[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 7597 Download | Alert*

The host is installed with Microsoft Windows Defender before 1.1.20200.4 or Microsoft Security Essentials before 1.1.20200.4 and is prone to a security feature bypass vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. An attacker who successfully exploited this vulnerability could bypass the Windows Defender detection with a specially crafted f ...

Windows NTLM Security Support Provider Information Disclosure Vulnerability. Successful exploitation of this vulnerability requires an attacker to prepare the target environment to improve exploit reliability.

Windows NFS Portmapper Information Disclosure Vulnerability. An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.

Windows Graphics Component Elevation of Privilege Vulnerability. Successful exploitation of this vulnerability requires an attacker to win a race condition and also to take additional actions prior to exploitation to prepare the target environment. An attacker who successfully exploited this vulnerability could gain specific limited SYSTEM privileges.

Win32k Elevation of Privilege Vulnerability. An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.

Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability. Successful exploitation of this vulnerability requires an attacker to win a race condition. To exploit this vulnerability, an attacker would need to send a specially crafted malicious SSTP packet to a SSTP server. This could result in remote code execution on the server side.

Windows Installer Elevation of Privilege Vulnerability. An attacker would only be able to delete targeted files on a system. They would not gain privileges to view or modify file contents. This vulnerability does not allow disclosure of any confidential information, but could allow an attacker to delete data that could include data that results in the service being unavailable.

Remote Desktop Client Remote Code Execution Vulnerability. An attacker must send the user a malicious file and convince the user to open said file. An attacker could host the malicious .rdp file on a file share, a user accessing the .rdp file from the share would be vulnerable to remote code execution.

Windows Pragmatic General Multicast (PGM) Denial of Service Vulnerability

Windows Network File System Remote Code Execution Vulnerability. This vulnerability could be exploited over the network by making an unauthenticated, specially crafted call to a Network File System (NFS) service to trigger a Remote Code Execution (RCE).


Pages:      Start    494    495    496    497    498    499    500    501    502    503    504    505    506    507    ..   759

© SecPod Technologies