[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249622

 
 

909

 
 

195549

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26707 Download | Alert*

The host is installed with GlobalProtect Agent 5.1.x before 5.1.10 or 5.2.x before 5.2.5 and is prone to an improper link resolution vulnerability. A flaw is present in the application, which fails to properly handle system process. Successful exploitation enables a local attacker to disrupt system processes and potentially execute arbitrary code with SYSTEM privileges.

The host is installed with GlobalProtect App 5.2 before 5.2.9 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle the credentials of the local user. Successful exploitation allows a user to prevent the transmission of the user's local user credentials to the target GlobalProtect portal regardless of the portal configuration.

The host is installed with GlobalProtect Agent 5.0.x before 5.0.5 or 4.1.x before 4.1.13 and is prone to an unquoted search path or element vulnerability. A flaw is present in the application, which fails to properly handle an issue in unspecified vectors. On successful exploitation, allows an authenticated local user with file creation privileges on the root of the OS disk (C:\) or to Program Fil ...

The host is installed with GlobalProtect Agent 5.0.x before 5.0.10 or 5.1.x before 5.1.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle an issue in logging component. On successful exploitation, logging component of Palo Alto Networks Global Protect Agent allows a local authenticated user to read VPN cookie information ...

The host is installed with GlobalProtect Agent 5.0.x before 5.0.3 or 4.1.x before 4.1.12 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle an issue in auto-update feature. On successful exploitation, auto-update feature can allow for modification of a GlobalProtect Agent MSI installer package on disk before installation.

A remote code execution vulnerability exists in Microsoft Office that could be exploited when a user opens a file containing a malformed graphics image or when a user inserts a malformed graphics image into an Office file. Such a file could also be included in an email attachment. An attacker could exploit the vulnerability by constructing a specially crafted EPS file that could allow remote code ...

A remote code execution vulnerability exists in Microsoft Office that could be exploited when a user opens a file containing a malformed graphics image or when a user inserts a malformed graphics image into an Office file. Such a file could also be included in an email attachment. An attacker could exploit the vulnerability by constructing a specially crafted EPS file that could allow remote code ...

Microsoft Dynamics CRM (on-premises) Remote Code Execution Vulnerability.

Microsoft SharePoint Remote Code Execution Vulnerability

Microsoft Dynamics CRM (on-premises) Remote Code Execution Vulnerability.


Pages:      Start    1808    1809    1810    1811    1812    1813    1814    1815    1816    1817    1818    1819    1820    1821    ..   2670

© SecPod Technologies