[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 7597 Download | Alert*

The grub2 packages provide version 2 of the Grand Unified Boot Loader , a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices. Security Fix: grub2: grub2-set-bootflag can be abused by local users grub2: Out-of-bounds write at fs/ntfs.c may lead to unsigned code exec ...

The grub2 packages provide version 2 of the Grand Unified Boot Loader , a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices. Security Fix: grub2: grub2-set-bootflag can be abused by local users grub2: Out-of-bounds write at fs/ntfs.c may lead to unsigned code exec ...

Ansible is a radically simple model-driven configuration management, multi-node deployment, and remote task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically. Security Fix: ansible-core: possible information leak in tasks that i ...

The host is installed with Azure DevOps Server 2022, 2020, or 2019 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle an issue in the Queue Build permissions. Successful exploitation could allow attacker to cause remote code execution.

Windows Hyper-V Denial of Service Vulnerability. Successful exploitation of this vulnerability could allow a Hyper-V guest to affect the functionality of the Hyper-V host.

Dynamics 365 Sales Spoofing Vulnerability. The vulnerability is in the web server, but the malicious scripts execute in the victim's browser on their machine. The attacker is only able to modify the content of the vulnerable link to redirect the victim to a malicious site.

The host is installed with Azure Connected Machine agent before 1.38 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to add symlinks and cause an arbitrary file delete as SYSTEM.

Windows Kernel Elevation of Privilege Vulnerability. An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.

Windows USB Generic Parent Driver Remote Code Execution Vulnerability. Successful exploitation of this vulnerability requires an attacker to prepare the target environment to improve exploit reliability.

Windows DNS Client Denial of Service Vulnerability


Pages:      Start    655    656    657    658    659    660    661    662    663    664    665    666    667    668    ..   759

© SecPod Technologies