[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 17290 Download | Alert*

The host is installed with Google Chrome before 89.0.4389.72 or Edge Chromium before 89.0.774.45 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 89.0.4389.72 or Edge Chromium before 89.0.774.45 and is prone to an insufficient policy enforcement vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 89.0.4389.72 or Edge Chromium before 89.0.774.45 and is prone to a Uninitialized use vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 92.0.4515.107 or Edge-Chromium before 92.0.902.55 and is prone to an insufficient validation of untrusted input vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Apple Mac OS before 11.6 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle improper checks. On successful exploitation, a malicious application may bypass Gatekeeper checks.

The host is installed with Apple Mac OS X 10.15.7 or Apple Mac OS before 11.6 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle improper validation of symlinks. On successful exploitation, an application may be able to access restricted files.

The host is installed with Apple Mac OS 11 before 11.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a issue in Secure Shell sessions. On successful exploitation, a malicious unsandboxed app on a system with Remote Login enabled may bypass Privacy preferences.

The host is installed with Apple Mac OS X 10.15.7 or Apple Mac OS before 11.6 and is prone to a race condition vulnerability. A flaw is present in the application, which fails to properly handle an improper locking issue. On successful exploitation, a malicious application may be able to execute arbitrary code with kernel privileges.

The host is installed with Apple Mac OS X 10.15.7 or Apple Mac OS before 11.6 and is prone to a type confusion vulnerability. A flaw is present in the application, which fails to properly handle an improper state check. On successful exploitation, a malicious application may be able to execute arbitrary code with kernel privileges.

The host is installed with Apple Mac OS X 10.15.7 or Apple Mac OS before 11.6 and is prone to an out-of-bounds vulnerability. A flaw is present in the application, which fails to properly handle improper input validation. On successful exploitation, a malicious application may be able to execute arbitrary code with kernel privileges.


Pages:      Start    1162    1163    1164    1165    1166    1167    1168    1169    1170    1171    1172    1173    1174    1175    ..   1728

© SecPod Technologies