[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255227

 
 

909

 
 

198741

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 17564 Download | Alert*

The host is installed with Apple Mac OS 14 before 14.5 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle issues in memory handling. On successful exploitation, an app may be able to cause unexpected system termination.

The host is installed with Apple Mac OS 14 before 14.5 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle issues in checks. On successful exploitation, an attacker may be able to access user data.

The host is installed with Apple Mac OS 14 before 14.5 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle issues in memory handling. On successful exploitation, an attacker may be able to cause unexpected app termination or arbitrary code execution.

The host is installed with Apple Mac OS 14 before 14.5 and is prone to a sensitive information disclosure vulnerability. A flaw is present in the application, which fails to properly handle issues in validation. On successful exploitation, a shortcut may output sensitive user data without consent.

The host is installed with Apple Mac OS 14 before 14.5 or Apple Safari before 17.5 on Apple Mac OS 12, Apple Mac OS 13 and is prone to a bypass pointer authentication vulnerability. A flaw is present in the application, which fails to properly handle issues in checks. On successful exploitation, an attacker with arbitrary read and write capability may be able to bypass pointer authentication.

The host is installed with Apple Mac OS 14 before 14.5 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle issues in memory handling. On successful exploitation, an app may be able to disclose kernel memory.

Mozilla Firefox 126.0, Mozilla Firefox ESR 115.11.0 and Mozilla Thunderbird 115.11.0 : A type check was missing when handling fonts in PDF.js, which would allow arbitrary JavaScript execution in the PDF.js context.

Mozilla Firefox 126.0, Mozilla Firefox ESR 115.11.0 and Mozilla Thunderbird 115.11.0 : If the browser.privatebrowsing.autostart preference is enabled, IndexedDB files were not properly deleted when the window was closed. This preference is disabled by default in Firefox.

Mozilla Firefox 126.0, Mozilla Firefox ESR 115.11.0 and Mozilla Thunderbird 115.11.0 : A bug in popup notifications' interaction with WebAuthn made it easier for an attacker to trick a user into granting permissions.

Mozilla Firefox 126.0, Mozilla Firefox ESR 115.11.0 and Mozilla Thunderbird 115.11.0 : When importing resources using Web Workers, error messages would distinguish the difference between application/javascript responses and non-script responses. This could have been abused to learn information cross-origin.


Pages:      Start    7    8    9    10    11    12    13    14    15    16    17    18    19    20    ..   1756

© SecPod Technologies