[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26186 Download | Alert*

The host is installed with Adobe Digital Editions before 4.5.11.187658 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to cause arbitrary code execution.

The host is installed with Azure DevOps Server 2022 or 2020 and is prone to a spoofing vulnerability. A flaw is present in the application, which fails to handle a malicious file. Successful exploitation could allow an attacker to combine this with other vulnerabilities to perform an attack.

The host is installed with Visual Studio 2017 or 2019 or 2022 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause unspecified impact.

The host is installed with Visual Studio 2017 or 2019 or 2022 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause unspecified impact.

The host is installed with SQL Server and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Azure DevOps Server 2022 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow an attacker to cause loss of integrity.

The host is installed with Azure DevOps Server 2022 or 2020 and is prone to a spoofing vulnerability. A flaw is present in the application, which fails to handle a crafted script. Successful exploitation could allow an attacker to collect detailed data about ADO elements such as org/proj configuration, users, groups, teams, projects, pipelines, board, or wiki.

The host is installed with Azure DevOps Server 2020 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause unspecified impact.

Azure Service Fabric Container Elevation of Privilege Vulnerability

The host is installed with SQL Server and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.


Pages:      Start    1600    1601    1602    1603    1604    1605    1606    1607    1608    1609    1610    1611    1612    1613    ..   2618

© SecPod Technologies