[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 8274 Download | Alert*

The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly consider the effects of realloc on buffer contents. Successful exploitation could allow local users to obtain sensitive private-key information.

The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly consider the effects of realloc on buffer contents. Successful exploitation could allow local users to obtain sensitive private-key information.

The host is installed with Apple Mac OS 10.8 before 10.13 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation allows attackers to cause an unexpected application termination or arbitrary code execution.

The host is installed with Apple Mac OS X or Server 10.12.3 and is prone to a t2p_process_jpeg_strip heap buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Google Chrome before 28.0.1500.95 and is prone to remote code execution vulnerability. The flaw is present in the application, which does not properly handle vectors that leverage "type confusion". Successful exploitation allows remote attackers to cause a denial of service or possibly have unspecified other impact.

The host is installed with Google Chrome before 31.0.1650.63 and is prone to out-of-bounds write vulnerability. The flaws are present in the application, which fails to handle the DehoistArrayIndex function. Successful exploitation allows the remote attacker to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact.

The host is installed with Google Chrome before 31.0.1650.63 and is prone to out-of-bounds read vulnerability. The flaws are present in the application, which fails to handle the DehoistArrayIndex function. Successful exploitation allows the remote attacker to cause a denial of service (out-of-bounds read).

The host is installed with Google Chrome before 33.0.1750.146 and is prone to multiple unspecified vulnerabilities. The flaws are present in the application, which fails to handle certain vectors related to V8 engine. Successful exploitation allows attackers to cause a denial of service or possibly have other impact via unknown vectors.

The host is installed with Apple Mac OS X or Server 10.7.5, OS X 10.8.5 or OS X 10.9 through 10.9.4 and is prone to multiple vulnerabilities. The flaws are present in the application, which does not ensure that certain swap operations have a constant-time behavior. Successful exploitation may lead to arbitrary code execution.

The host is installed with Opera before 11.51 or Apple Mac OS X 10.6.8 or 10.7x before 10.7.3 and is prone to unspecified vulnerability. A flaw is present in the application which is caused due to some unspecified error. Successful exploitation allows attackers to cause unknown impacts.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   827

© SecPod Technologies