[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

252212

 
 

909

 
 

196748

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31433 Download | Alert*

The host is installed with Dell SupportAssist for business PCs before 3.2.0 or Dell SupportAssist for home PCs 3.11.2 and is prone to a local privilege escalation vulnerability. A flaw is present in the application, which fails to handle issues in advanced driver restore component. Successful exploitation could allow a local malicious user may potentially exploit this vulnerability, leading to pri ...

The host is installed with Dell SupportAssist for business PCs before 3.2.0 or Dell SupportAssist for home PCs 3.11.4 and is prone to a cryptographic weakness vulnerability. A flaw is present in the application, which fails to handle unspecified vector. Successful exploitation could allow an authenticated non-admin user to potentially exploit the issue and obtain sensitive information.

The host is installed with Dell SupportAssist for business PCs before 3.2.0 or Dell SupportAssist for home PCs 3.11.4 and is prone to a cryptographic weakness vulnerability. A flaw is present in the application, which fails to handle unspecified vector. Successful exploitation could allow an authenticated non-admin user to potentially exploit the issue and obtain sensitive information.

The host is installed with Dell SupportAssist for business PCs before 3.2.0 or Dell SupportAssist for home PCs 3.11.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle unspecified vector. Successful exploitation could allow a local authenticated malicious user that could potentially exploit the vulnerability to elevate privileges and ...

The host is installed with Dell SupportAssist for business PCs before 3.2.0 or Dell SupportAssist for home PCs 3.11.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle unspecified vector. Successful exploitation could allow a local malicious user with low privileges could exploit the vulnerability to view and modify sensitive infor ...

The host is installed with Dell SupportAssist for business PCs before 3.3.0 or Dell SupportAssist for home PCs 3.12.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle rate limit bypass issues in screenmeet API third party component. Successful exploitation could allow an unauthenticated attacker that potentially exploit the vulnerability and ...

The host is installed with Dell SupportAssist for home PCs 3.11.4 and is prone to an insufficient session expiration vulnerability. A flaw is present in the application, which fails to handle unspecified vector. Successful exploitation could allow an authenticated non-admin user can be able to obtain the refresh token and that leads to reuse the access token and fetch sensitive information.

The host is installed with Geforce Experience prior to 3.27.0.112 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle NVContainer component. On successful exploitation, user without administrator privileges can create a symbolic link to a file that requires elevated privileges to write to or modify, which may lead to denial of ...

The host is installed with Git before 2.39.2 or Visual Studio 2017 or 2019 or 2022 and is prone to an untrusted search path vulnerability. A flaw is present in the application, which fails to handle an issue in `gitk` component. Successful exploitation allows attackers to potentially run executables from the current directory inadvertently, which can be exploited with some social engineering to tr ...

The host is installed with Docker Desktop before 4.17.x and is prone to a bypass vulnerability. A flaw is present in the application, which fails to handle issues in unspecified vectors. Successful exploitation allows an unprivileged user to bypass ECI restrictions by setting Docker host to docker.raw.sock.


Pages:      Start    1859    1860    1861    1862    1863    1864    1865    1866    1867    1868    1869    1870    1871    1872    ..   3143

© SecPod Technologies