[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 17483 Download | Alert*

The host is installed with Google Chrome before 120.0.6099.199, or Microsoft Edge before 120.0.2210.121 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Apple Mac OS 14 before 14.3 or Apple Safari before 17.3 on Apple Mac OS 12, Apple Mac OS 13 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle access issues On successful exploitation, a maliciously crafted webpage may be able to fingerprint the user.

The host is installed with Apple Mac OS 14 before 14.3 or Apple Safari before 17.3 on Apple Mac OS 12, Apple Mac OS 13 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle issues in memory. On successful exploitation, processing web content may lead to arbitrary code execution.

The host is installed with Apple Mac OS 14 before 14.3, Apple Mac OS 12 before 12.7.3, Apple Mac OS 13 before 13.6.4 or Apple Safari before 17.3 on Apple Mac OS 12, Apple Mac OS 13 and is prone to a type confusion vulnerability. A flaw is present in the application, which fails to properly handle issues in checks. On successful exploitation, processing maliciously crafted web content may lead to a ...

The host is installed with Google Chrome before 124.0.6367.155 or Microsoft Edge before 124.0.2478.97 and is prone to an use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 124.0.6367.201 and Microsoft Edge before 124.0.2478.97 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 125.0.6422.60 or Microsoft Edge before 124.0.2478.109 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 125.0.6422.60 or Microsoft Edge before 124.0.2478.109 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 125.0.6422.60 or Microsoft Edge before 124.0.2478.109 and is prone to an inappropriate implementation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Foxit PDF Reader before 10.1.4, or Foxit PDF Editor before 10.1.4 and is prone to a sql injection vulnerability. A flaw is present in the applications which fails to properly handle crafted data at the end of a string. Successful exploitation allows attackers to cause an SQL injection attack.


Pages:      Start    9    10    11    12    13    14    15    16    17    18    19    20    21    22    ..   1748

© SecPod Technologies