The host is installed with Apple Mac OS before 13.0 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle memory related issues. On successful exploitation, an app may be able to execute arbitrary code with kernel privileges.
The host is installed with Oracle Java SE through 8u401 or Apple Safari before 16.6.1 on Apple Mac OS 11, Apple Mac OS 12, or Apple Safari before 17.0 on Apple Mac OS 13, or Apple Mac OS before 14.0 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle issues in improved checks. On successful exploitation, processing web con ...
The host is installed with Oracle Java SE through 8u401 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to JavaFX (WebKitGTK). Successful exploitation allows attackers to affect confidentiality, integrity and availability.
The host is installed with Apple Mac OS 14 before 14.4, Apple Mac OS 12 before 12.7.4 or Apple Mac OS 13 before 13.6.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle issues in improved validation. On successful exploitation, an attacker with arbitrary kernel read and write capability may be able to bypass kernel memory protec ...
The host is installed with Foxit PDF Editor through 11.1.5.0913, or 12.x through 12.1.1.55342 and is prone to a use after free vulnerability. A flaw is present in the applications which fails to properly handle the use of null pointer or object that has been deleted or freed without proper validation. Successful exploitation could allow attackers to execute remote code or disclose information.
The host is installed with Microsoft Edge before 123.0.2420.81 and is prone to a spoofing vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.
The host is installed with Microsoft Edge before 123.0.2420.81 and is prone to a spoofing vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.
The host is installed with Wireshark 3.6.x before 3.6.23, 4.0.x before 4.0.15, or 4.2.x before 4.2.5 and is prone to a mismatched memory management routines vulnerability. A flaw is present in the application, which fails to properly handle issues in editcap command line utility. Successful exploitation allows atackers to cause denial of service via crafted capture file.
The host is installed with Wireshark 3.6.x before 3.6.23, 4.0.x before 4.0.15, or 4.2.x before 4.2.5 and is prone to an infinite loop vulnerability. A flaw is present in the application, which fails to properly handle issues in MONGO and ZigBee TLV dissector. Successful exploitation allows atackers to cause denial of service via packet injection or crafted capture file.
The host is installed with Wireshark 3.6.x before 3.6.24, 4.0.x before 4.0.15, or 4.2.x before 4.2.5 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to properly handle issues in editcap command line utility. Successful exploitation allows atackers to cause denial of service via crafted capture file.