[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26316 Download | Alert*

The host is installed with Microsoft Edge Chromium before 100.0.1185.36 and is prone to a type confusion vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 100.0.4896.75 and is prone to a type confusion vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

Mozilla Firefox 90, Mozilla Firefox ESR 78.12 and Mozilla Thunderbird 78.12 : An out of bounds write in ANGLE could have allowed an attacker to corrupt memory leading to a potentially exploitable crash.

The host is installed with Google Chrome before 91.0.4472.101 or Edge-Chromium before 91.0.864.48 or Mozilla Firefox before 90 or Firefox ESR Before 78.12 or Thunderbird before 78.12 and is prone to an out of bounds write vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

A remote code execution vulnerability exists in the way that the IEToEdge Browser Helper Object (BHO) plugin on Internet Explorer handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user ...

The host is installed with Microsoft Edge before 116.0.1938.54 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows the attacker to have unspecified impact.

The host is installed with Microsoft Edge before 116.0.1938.54 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow the attacker to only discloses limited information, no sensitive information can be obtained.

The host is installed with Microsoft Edge before 116.0.1938.54 and is prone to an use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Microsoft Edge before 115.0.1901.200 and is prone to a security feature bypass vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to view sensitive information affecting confidentiality.

The host is installed with Microsoft Edge before 115.0.1901.183 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.


Pages:      Start    13    14    15    16    17    18    19    20    21    22    23    24    25    26    ..   2631

© SecPod Technologies