| Latest Exploits |
| Showing 'Latest Exploits' from 71 to 80|
| |Serv-U FTP Server 126.96.36.199 Local Privilege Escalation Serv-U FTP Server version 188.8.131.52 suffers from a local privilege escalation vulnerability via authentication bypass.
| |Siemens LOGO! 8 Recoverable Password Format Due to storing passwords in a recoverable format on Siemens LOGO! 8 PLCs, an attacker can gain access to configured passwords as cleartext.
| |Siemens LOGO! 8 Missing Authentication Due to storing passwords in a recoverable format on Siemens LOGO! 8 PLCs, an attacker can gain access to configured passwords as cleartext.
| |Siemens LOGO! 8 Hard-Coded Cryptographic Key Due to the use of a hard-coded cryptographic key, an attacker can put the integrity and confidentiality of encrypted data of all Siemens LOGO! 8 PLCs using this key at risk, for instance decrypting network communication during a man-in-the-middle...
| |Qualcomm Android Kernel Use-After-Free The Qualcomm Android kernel suffers from a use-after-free vulnerability via an incorrect set_page_dirty() in KGSL.
| |Microsoft Windows AppX Deployment Service Local Privilege Escalation Microsoft Windows suffers from a deployment service local privilege escalation vulnerability that bypasses the fix for CVE-2019-0841.
| |Free SMTP Server 2.5 Denial Of Service Free SMTP Server version 2.5 denial of service proof of concept exploit.
| |VFront 0.99.5 Persistent Cross Site Scripting VFront version 0.99.5 suffers from a persistent cross site scripting vulnerability.
| |VFront 0.99.5 Reflective Cross Site Scripting VFront version 0.99.5 suffers from multiple reflective cross site scripting vulnerabilities.
| |Phraseanet DAM Cross Site Scripting Phraseanet DAM versions prior to 4.0.7 suffer from a cross site scripting vulnerability.
| « Newer 3 4 5 6 7 8 9 10 11 12 Older » |