[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248038

 
 

909

 
 

194772

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26566 Download | Alert*

The host is installed with Malwarebytes before 4.5.22.236 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle the symbolic link. Successful exploitation could allow an attacker to delete any arbitrary file on the system by exploiting the local quarantine system.

The host is installed with Papercut NG before 22.1.1 and is prone to a cross-site request forgery vulnerability. A flaw is present in the applications which fails to properly handle unspecified vectors. Successful exploitation could allow a remote attackers to alter security settings or execute arbitrary code.

The host is installed with Couchbase Server 2.x through 6.6.6, 7.x through 7.0.5 and 7.1.0 through 7.1.2 and is prone to a sensitive information disclosure vulnerability. A flaw is present in the application, which fails to redacte field messages from the logged validation messages. Successful exploitation could allow attackers to obtain sensitive information.

The host is installed with WebSphere Application Server Network Deployment 9.x through 9.0.5.15, 8.5.x through 8.5.5.23 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an issue in the Admin Console. Successful exploitation allows attackers to embed arbitrary JavaScript code in the Web UI thus altering the intended functiona ...

Microsoft Excel Remote Code Execution Vulnerability

Windows Installer Elevation of Privilege Vulnerability. An attacker would only be able to delete targeted files on a system. They would not gain privileges to view or modify file contents. This vulnerability does not allow disclosure of any confidential information, but could allow an attacker to delete data that could include data that results in the service being unavailable.

The host is installed with Visual Studio code before 1.77.2 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows remote attackers to execute arbitrary code.

The host has Teams Javascript SDK library v1.x less than 1.13.1 or v2.x less than 2.10.1. A flaw is present in the application which fails to handle unspecified vectors. Successful exploitation could allow attackers to gain sensitive information.

The host is installed with Citrix Workspace App before 2212, 2203 LTSR before CU2 or 1912 LTSR before CU7 Hotfix 2 and is prone to an improper access control vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. On successful exploitation, a malicious user can cause log files to be written to a directory that they do not have permission to write to.

The host is installed with Citrix Workspace App before 2212, 2203 LTSR before CU2 or 1912 LTSR before CU7 Hotfix 2 and is prone to an improper access control vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. On successful exploitation, privilege escalation on the system running a vulnerable version of Citrix Workspace app for Windows.


Pages:      Start    1581    1582    1583    1584    1585    1586    1587    1588    1589    1590    1591    1592    1593    1594    ..   2656

© SecPod Technologies