[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 16267 Download | Alert*

The host is installed with Google Chrome before 124.0.6367.201 and Microsoft Edge before 124.0.2478.97 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 124.0.6367.207 or Microsoft Edge before 124.0.2478.105 and is prone to an out of bounds write vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 125.0.6422.60 or Microsoft Edge before 124.0.2478.109 and is prone to a type confusion vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 125.0.6422.112, or Microsoft Edge before 125.0.2535.67 and is prone to a type confusion vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Apple Mac OS before 13.0 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle issues in sandbox restrictions. On successful exploitation, an app may be able to break out of its sandbox.

Mozilla Firefox ESR 115.12 : Memory corruption in the networking stack could have led to a potentially exploitable crash.

Mozilla Firefox 127 : Memory safety bugs present in Firefox 126. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

Mozilla Firefox 127, Mozilla Firefox ESR 115.12 : Memory safety bugs present in Firefox 126, Firefox ESR 115.11. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

Mozilla Firefox 127 : In violation of spec, cookie prefixes such as __Secure were being ignored if they were not correctly capitalized - by spec they should be checked with a case-insensitive comparison. This could have resulted in the browser not correctly honoring the behaviors specified by the prefix.

Mozilla Firefox 127 : By manipulating the fullscreen feature while opening a data-list, an attacker could have overlaid a text box over the address bar. This could have led to user confusion and possible spoofing attacks.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1626

© SecPod Technologies