[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15799 Download | Alert*

The host is installed with Google Chrome before 122.0.6261.111, or Microsoft Edge before 122.0.2365.80 and is prone to an inappropriate implementation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 122.0.6261.111, or Microsoft Edge before 122.0.2365.80 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 122.0.6261.128, or Microsoft Edge before 122.0.2365.92 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

Mozilla Firefox 125, Mozilla Firefox ESR 115.10 and Mozilla Thunderbird 115.10.0 : There was no limit to the number of HTTP/2 CONTINUATION frames that would be processed. A server could abuse this to create an Out of Memory condition in the browser.

The host is installed with Jenkins 2.367 through 2.369 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle issue in tooltips of the l:helpIcon UI component. Successful exploitation allows attackers to control tooltips for the l:helpIcon UI component.

The host is installed with Adobe Illustrator 2023 before 27.9.3 or Adobe Illustrator 2024 before 28.4.0 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Adobe Illustrator 2023 before 27.9.3 or Adobe Illustrator 2024 before 28.4.0 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Adobe Illustrator 2023 before 27.9.3 or Adobe Illustrator 2024 before 28.4.0 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Adobe Illustrator 2023 before 27.9.3 or Adobe Illustrator 2024 before 28.4.0 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could lead to memory leak.

The host is installed with Adobe Animate 23.0.x before 23.0.5, or 24.0.x before 24.0.2 and is prone to a NULL pointer dereference vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause application denial-of-service.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1579

© SecPod Technologies