[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15769 Download | Alert*

The host is installed with Apple Mac OS before 13.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle issues in improved checks. On successful exploitation, a remote user may be able to cause a denial of service.

Microsoft Office Remote Code Execution Vulnerability.

The host is installed with Microsoft Edge before 120.0.2210.133 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could lead to a browser sandbox escape.

The host is installed with XZ version 5.6.0, or 5.6.1 and is prone to a supply-chain backdooor vulnerability. A flaw is present in the application, which fails to handle a malicious code in the upstream tarballs of xz. Successful exploitation allows attackers to use any software linked against the modified liblzma library, intercepting and modifying the data interaction with this library.

The host is installed with Wireshark 4.0.x before 4.0.14, or 4.2.x before 4.2.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the T.38 dissector. Successful exploitation allows atackers to crash Wireshark by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.

The host is installed with Google Chrome before 124.0.6367.60 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 124.0.6367.60 and is prone to an insufficient policy enforcement vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 124.0.6367.60 and is prone to an inappropriate implementation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 124.0.6367.60 and is prone to an inappropriate implementation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 124.0.6367.60 and is prone to an inappropriate implementation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1576

© SecPod Technologies