[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31148 Download | Alert*

The host is installed with Microsoft Common Data Model SDK for Python before 1.7.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle issues in unspecified vectors. Successful exploitation allow authenticated attackers to trigger this vulnerability and cause denial of service.

The host is installed with Azure DevOps Server 2022, or 2020 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle issues in unspecified vectors. Successful exploitation could allow an attacker to gain access to the secrets of the user of the affected application.

Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability. The type of information that could be disclosed if an attacker successfully exploited this vulnerability is sensitive information. Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges.

Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability. The type of information that could be disclosed if an attacker successfully exploited this vulnerability is sensitive information. Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges.

Microsoft SQL ODBC Driver Remote Code Execution Vulnerability. An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via a connection driver.

Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability. An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via a connection driver.

The host is installed with Microsoft Azure RTOS GUIX Studio before 6.3.0 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.

Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability. On successful exploitation, the attacker is only able to modify the content of the vulnerable link to redirect the victim to a malicious site. Limited information from the victim's browser associated with the vulnerable URL can be sent to the attacker by the malicious code.

The host is installed with Azure Identity SDK for Python before 1.14.1 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly handle issues in unspecified vectors. Successful exploitation allow attackers to gain high privileges, which include read, write, and delete functionality.

The host is installed with PaperCut NG 20.0.0 before 20.1.9 or 21.0.0 before 21.2.13 or 22.0.0 before 22.1.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle issues in application servers. Successful exploitation could allow an unauthenticated attacker with direct server IP access to upload arbitrary files into a target directo ...


Pages:      Start    1874    1875    1876    1877    1878    1879    1880    1881    1882    1883    1884    1885    1886    1887    ..   3114

© SecPod Technologies