Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
Microsoft Outlook Information Disclosure Vulnerability
Windows Cryptographic Services Information Disclosure Vulnerability
Remote Procedure Call Information Disclosure Vulnerability
Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability
Netlogon RPC Elevation of Privilege Vulnerability
Microsoft SharePoint Server Security Feature Bypass Vulnerability
Windows Deployment Services Information Disclosure Vulnerability
Windows Telephony Server Elevation of Privilege Vulnerability
Windows TCP/IP Information Disclosure Vulnerability
Windows Cryptographic Services Information Disclosure Vulnerability
Microsoft Message Queuing Information Disclosure Vulnerability
Microsoft Message Queuing Information Disclosure Vulnerability
IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 uses a one-way cryptographic hash against an input that should not be reversible, such as a password, but the software does not also use a salt as part of the input. IBM X-Force ID: 212785.
Windows MSHTML Platform Remote Code Execution Vulnerability
DHCP Server Service Information Disclosure Vulnerability
Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability
ASP.NET Core SignalR and Visual Studio Information Disclosure Vulnerability
Windows Print Spooler Information Disclosure Vulnerability
The DNS client in Microsoft Windows 2000 SP4, XP SP2, Server 2003 SP1 and SP2, and Vista uses predictable DNS transaction IDs, which allows remote attackers to spoof DNS responses.
Cleartext Transmission of Sensitive Information vulnerability in Hitachi Device Manager on Windows, Linux (Device Manager Server, Device Manager Agent, Host Data Collector components) allows Interception.This issue affects Hitachi Device Manager: before 8.8.5-02.
ASP.NET and Visual Studio Security Feature Bypass Vulnerability
Improper Validation of Certificate with Host Mismatch vulnerability in Hitachi Device Manager on Windows, Linux (Device Manager Server, Device Manager Agent, Host Data Collector components) allows Man in the Middle Attack.This issue affects Hitachi Device Manager: before 8.8.5-02.
IBM GSKit-Crypto could allow a remote attacker to obtain sensitive information, caused by a timing-based side channel in the RSA Decryption implementation. By sending an overly large number of trial messages for decryption, an attacker could exploit this vulnerability to obtain sensitive information.
.NET and Visual Studio Elevation of Privilege Vulnerability
typed-rest-client is a library for Node Rest and Http Clients with typings for use with TypeScript. Users of the typed-rest-client library version 1.7.3 or lower are vulnerable to leak authentication data to 3rd parties. The flow of the vulnerability is as follows: First, send any request with `BasicCredentialHandler`, `BearerCredentialHandler` or `PersonalAccessTokenCredentialHandler`. Second, the target host may return a redirection (3xx), with a link to a second host. Third, the next request will use the credentials to authenticate with the second host, by setting the `Authorization` header. The expected behavior is that the next request will *NOT* set the `Authorization` header. The problem was fixed in version 1.8.0. There are no known workarounds.
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
OLE Automation Information Disclosure Vulnerability
Windows OLE Remote Code Execution Vulnerability
Windows Remote Desktop Gateway (RD Gateway) Information Disclosure Vulnerability
An issue was discovered in Avast Antivirus before 20. The aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe) allows attackers to enumerate the network interfaces and access points from a Low Integrity process via RPC.
Windows Services for NFS ONCRPC XDR Driver Information Disclosure Vulnerability
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
Windows Network File System Information Disclosure Vulnerability
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
Remote Procedure Call Runtime Remote Code Execution Vulnerability
Remote Procedure Call Runtime Remote Code Execution Vulnerability
Windows NFS Portmapper Information Disclosure Vulnerability
Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability
IBM InfoSphere Information Server 11.7 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 246333
No exception handling vulnerability which revealed sensitive or excessive information to users.
Remote Procedure Call Runtime Remote Code Execution Vulnerability
IBM WebSphere Application Server 8.5 and 9.0 traditional could allow a remote attacker to execute arbitrary code on the system with a specially crafted sequence of serialized objects. IBM X-Force ID: 245513.
Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
Adobe RoboHelp Server versions 11.4 and earlier are affected by an Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability that could lead to information disclosure by an unauthenticated attacker. Exploitation of this issue does not require user interaction.
Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability
Microsoft Protected Extensible Authentication Protocol (PEAP) Information Disclosure Vulnerability
Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability
Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability