[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 194475 Download | Alert*

The host is installed with Zoom Client before 5.14.0 and is prone to an improper access control vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows a malicious user may to delete/replace Zoom Client files potentially causing a loss of integrity and availability to the Zoom Client.

The host is installed with Visual Studio code before 1.79.1 and is prone to a spoofing vulnerability. A flaw is present in the application, which fails to properly handle a malicious file. Successful exploitation could allow attackers to have unspecified impact.

The host is installed with Visual Studio code before 1.79.1 and is prone to a spoofing vulnerability. A flaw is present in the application, which fails to properly handle a malicious file. Successful exploitation could allow attackers to have unspecified impact.

The host is installed with Visual Studio code before 1.78.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow the disclosure of NTLM hashes.

The host is installed with Visual Studio code before 1.78.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow the disclosure of NTLM hashes.

The host is installed with Appium Desktop before 1.22.3-4 and is prone to an OS command injection vulnerability. A flaw is present in the application, which fails to properly handle the electron which is built with the misconfiguration of the "NodeIntegration". Successful exploitation could allow an unauthenticated attacker to execute commands on the machine where the application is running withou ...

The host is installed with Appium Desktop before 1.22.3-4 and is prone to an OS command injection vulnerability. A flaw is present in the application, which fails to properly handle the electron which is built with the misconfiguration of the "NodeIntegration". Successful exploitation could allow an unauthenticated attacker to execute commands on the machine where the application is running withou ...

The host is installed with PaperCut NG 15.0.0 through 19.2.7 or 20.0.0 through 20.1.6 or 21.0.0 through 21.2.10 or 22.0.0 through 22.0.8 and is prone to an authentication bypass vulnerability. A flaw is present in the application, which fails to properly handle issues in the SecurityRequestFilter class. On successful exploitation, an attacker can leverage this vulnerability to bypass authenticatio ...

The host is installed with PaperCut NG 15.0.0 through 19.2.7 or 20.0.0 through 20.1.6 or 21.0.0 through 21.2.10 or 22.0.0 through 22.0.8 and is prone to an authentication bypass vulnerability. A flaw is present in the application, which fails to properly handle issues in the SecurityRequestFilter class. On successful exploitation, an attacker can leverage this vulnerability to bypass authenticatio ...

The host is installed with PaperCut NG 8.0.0 through 19.2.7 or 20.0.0 through 20.1.6 or 21.0.0 through 21.2.10 or 22.0.0 through 22.0.8 and is prone to an improper access control vulnerability. A flaw is present in the application, which fails to properly handle issues in SetupCompleted class. On successful exploitation, an attacker can leverage this vulnerability to bypass authentication and exec ...


Pages:      Start    7799    7800    7801    7802    7803    7804    7805    7806    7807    7808    7809    7810    7811    7812    ..   19447

© SecPod Technologies