[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

247085

 
 

909

 
 

194218

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 193241 Download | Alert*

The host is missing an important security update for KB4479232

Microsoft Dynamics NAV Cross Site Scripting Vulnerability. A cross site scripting vulnerability exists when Microsoft Dynamics NAV does not properly sanitize a specially crafted web request to an affected Dynamics NAV server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected Dynamics NAV server.

The host is missing a critical security update for KB4549673

The host is missing a critical security update for KB4549675

The host is missing a critical security update for KB4549674

Microsoft Dynamics Business Central/NAV Information Disclosure Vulnerability. An information disclosure vulnerability exists when Microsoft Dynamics Business Central/NAV on-premise does not properly hide the value of a masked field when showing the records as a chart page.

Microsoft Dynamics NAV 2017 is installed

The host is installed with Grails framework before 3.3.10 and is prone to a download of code without integrity check vulnerability. A flaw is present in the applications which fails to properly handle SDKMan notification service. Successful exploitation allows attackers to cause unspecified impact.

The host is installed with Malwarebytes 4.1.0.56 and is prone to improper link resolution before file access vulnerability. A flaw is present in the applications which fails to properly handle the local quarantine system. Successful exploitation allow remote attackers to delete an arbitrary file on the system.

The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.4 and is prone to multiple cross-site scripting (XSS) vulnerabilities. The flaws are present in the application, which fails to handle vectors involving (1) certain encrypted strings in e-mail headers, related to contrib/decrypt_headers.php; (2) PHP_SELF; and (3) the query string (aka QUERY_STRING). Successful exploitation could ...


Pages:      Start    10461    10462    10463    10464    10465    10466    10467    10468    10469    10470    10471    10472    10473    10474    ..   19324

© SecPod Technologies