[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 17483 Download | Alert*

Microsoft Excel Information Disclosure Vulnerability.

The host is installed with Edge-Chromium before 117.0.2045.31 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Edge-Chromium before 117.0.2045.31 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Apple Mac OS 13 before 13.4.1 (a), or Apple Safari before 16.5.2 on Apple Mac OS 11 or Apple Mac OS 12 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle checks issue. Successful exploitation allow attackers to execute arbitrary code on processing web content.

The host is installed with Oracle Java SE through 8u401 or Apple Safari before 16.6.1 on Apple Mac OS 11, Apple Mac OS 12, or Apple Safari before 17.0 on Apple Mac OS 13, or Apple Mac OS before 14.0 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle issues in improved checks. On successful exploitation, processing web con ...

The host is installed with Oracle Java SE through 8u401 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to JavaFX (WebKitGTK). Successful exploitation allows attackers to affect confidentiality, integrity and availability.

Microsoft Office Graphics Elevation of Privilege Vulnerability.

The host is installed with Microsoft Edge before 119.0.2151.44 and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could lead to code execution.

Microsoft Excel Remote Code Execution Vulnerability.

Microsoft Office Graphics Remote Code Execution Vulnerability.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1748

© SecPod Technologies