[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31125 Download | Alert*

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is lo ...

A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory. The vulnerability could corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with adminis ...

Scripting Engine Memory Corruption Vulnerability. In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability through Internet Explorer and then convince a user to view the website. An attacker could also embed an ActiveX control marked "safe for initialization" in an application or Microsoft Office document that hosts the IE ren ...

The host is installed with PHP versions below 7.4.31, 8.0.x below 8.0.24 or 8.1.x below 8.1.11 and is prone to an improper input validation vulnerability. A flaw is present in the application, which fails to properly handle issue in the unspecified vectors. On successful exploitation, the vulnerability enables network and same-site attackers to set a standard insecure cookie in the victim's browse ...

The host is installed with Google Chrome before 124.0.6367.60 or Microsoft Edge before 124.0.2478.51 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 124.0.6367.60 or Microsoft Edge before 124.0.2478.51 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 124.0.6367.60 or Microsoft Edge before 124.0.2478.51 and is prone to an inappropriate implementation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 124.0.6367.60 or Microsoft Edge before 124.0.2478.51 and is prone to a out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Wireshark 4.0.x before 4.0.14, or 4.2.x before 4.2.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the T.38 dissector. Successful exploitation allows atackers to crash Wireshark by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.

The host is installed with Apache HTTP Server through 2.4.58 and is prone to a HTTP Response splitting vulnerability. A flaw is present in the application, which fails to properly handle input validation. Successful exploitation allows malicious or exploitable backend/content generators to split HTTP responses.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   3112

© SecPod Technologies