[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248678

 
 

909

 
 

195426

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26648 Download | Alert*

Microsoft Office Elevation of Privilege Vulnerability.

Microsoft Office Click-To-Run Elevation of Privilege Vulnerability.

Microsoft Office Graphics Elevation of Privilege Vulnerability.

The host is installed with Microsoft Common Data Model SDK for Python before 1.7.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle issues in unspecified vectors. Successful exploitation allow authenticated attackers to trigger this vulnerability and cause denial of service.

Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability. The type of information that could be disclosed if an attacker successfully exploited this vulnerability is sensitive information. Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges.

Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability. The type of information that could be disclosed if an attacker successfully exploited this vulnerability is sensitive information. Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges.

Microsoft SQL ODBC Driver Remote Code Execution Vulnerability. An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via a connection driver.

Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability. An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via a connection driver.

Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability. On successful exploitation, the attacker is only able to modify the content of the vulnerable link to redirect the victim to a malicious site. Limited information from the victim's browser associated with the vulnerable URL can be sent to the attacker by the malicious code.

The host is installed with Azure Identity SDK for Python before 1.14.1 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly handle issues in unspecified vectors. Successful exploitation allow attackers to gain high privileges, which include read, write, and delete functionality.


Pages:      Start    1623    1624    1625    1626    1627    1628    1629    1630    1631    1632    1633    1634    1635    1636    ..   2664

© SecPod Technologies