[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253562

 
 

909

 
 

197267

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 1000 Download | Alert*

The host is installed with Apple Mac OS 12 before 12.7.4, or Apple Mac OS 14 before 14.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle issues in checks. On successful exploitation, an app may be able to break out of its sandbox.

The host is installed with Apple Mac OS before 13.0 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle memory related issues. On successful exploitation, an app may be able to execute arbitrary code with kernel privileges.

The host is installed with Apple Mac OS before 13.0 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle issues in sandbox restrictions. On successful exploitation, an app may be able to break out of its sandbox.

The host is missing an important security update for KB5002559

The host is missing an important security update for KB5002562

The host is missing an important security update for KB5002564

The host is installed with Foxit PDF Reader through 2024.2.1.25153 or Foxit PDF Editor through 11.2.9.53938, 12.x through 12.1.6.15509, 13.x through 13.1.1.22432, 2023.x through 2023.3.0.23028 or 2024.x through 2024.2.1.25153 and is prone to a privilege escalation vulnerability. A flaw is present in the applications which fails to properly handle issues in validating the certificate of the updater ...

The host is installed with Wireshark 3.6.x before 3.6.23, 4.0.x before 4.0.15, or 4.2.x before 4.2.5 and is prone to a mismatched memory management routines vulnerability. A flaw is present in the application, which fails to properly handle issues in editcap command line utility. Successful exploitation allows atackers to cause denial of service via crafted capture file.

The host is installed with Wireshark 3.6.x before 3.6.23, 4.0.x before 4.0.15, or 4.2.x before 4.2.5 and is prone to an infinite loop vulnerability. A flaw is present in the application, which fails to properly handle issues in MONGO and ZigBee TLV dissector. Successful exploitation allows atackers to cause denial of service via packet injection or crafted capture file.

The host is installed with Wireshark 3.6.x before 3.6.24, 4.0.x before 4.0.15, or 4.2.x before 4.2.5 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to properly handle issues in editcap command line utility. Successful exploitation allows atackers to cause denial of service via crafted capture file.


Pages:      Start    90    91    92    93    94    95    96    97    98    99    ..   99

© SecPod Technologies