[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 1866 Download | Alert*

The host is installed with Google Chrome before 126.0.6478.54 and is prone to a type confusion vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is missing a high severity security update according to Google advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause unspecified impact.

The host is missing a high severity security update according to Google advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause unspecified impact.

Mozilla Firefox ESR 115.12 : Memory corruption in the networking stack could have led to a potentially exploitable crash.

Mozilla Firefox 127 : Memory safety bugs present in Firefox 126. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

Mozilla Firefox 127, Mozilla Firefox ESR 115.12 : Memory safety bugs present in Firefox 126, Firefox ESR 115.11. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

Mozilla Firefox 127 : In violation of spec, cookie prefixes such as __Secure were being ignored if they were not correctly capitalized - by spec they should be checked with a case-insensitive comparison. This could have resulted in the browser not correctly honoring the behaviors specified by the prefix.

Mozilla Firefox 127 : By manipulating the fullscreen feature while opening a data-list, an attacker could have overlaid a text box over the address bar. This could have led to user confusion and possible spoofing attacks.

Mozilla Firefox 127 : A website was able to detect when a user took a screenshot of a page using the built-in Screenshot functionality in Firefox.

Mozilla Firefox 127, Mozilla Firefox ESR 115.12 : By manipulating the text in an input tag, an attacker could have caused corrupt memory leading to a potentially exploitable crash.


Pages:      Start    96    97    98    99    100    101    102    103    104    105    106    107    108    109    ..   186

© SecPod Technologies