[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

251782

 
 

909

 
 

196543

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 2167 Download | Alert*

A security issue was discovered in Chromium, which could result in the execution of arbitrary code, denial of service or information disclosure. Google is aware that an exploit for CVE-2024-4671 exists in the wild.

Nick Galloway discovered an integer overflow in dav1d, a fast and small AV1 video stream decoder which could result in memory corruption.

Several security vulnerabilities have been discovered in Wordpress, a popular content management framework, which may lead to exposure of sensitive information to an unauthorized actor in WordPress or allowing unauthenticated attackers to discern the email addresses of users who have published public posts on an affected website via an Oracle style attack. Furthermore this update resolves a possib ...

The following vulnerabilities have been discovered in the WebKitGTK web engine: CVE-2023-42843 Kacper Kwapisz discovered that visiting a malicious website may lead to address bar spoofing. CVE-2023-42950 Nan Wang and Rushikesh Nandedkar discovered that processing maliciously crafted web content may lead to arbitrary code execution. CVE-2023-42956 SungKwon Lee discovered that processing web content ...

Security issues were discovered in Chromium, which could result in the execution of arbitrary code, denial of service or information disclosure.

The update for glib2.0 released as DSA 5682-1 caused a regression in ibus affecting text entry with non-trivial input methods. Updated glib2.0 packages are available to correct this issue.

Alicia Boya Garcia reported that the GDBus signal subscriptions in the GLib library are prone to a spoofing vulnerability. A local attacker can take advantage of this flaw to cause a GDBus-based client to behave incorrectly, with an application-dependent impact. gnome-shell is updated along with this update to avoid a screencast regression after fixing CVE-2024-34397.

The host is installed with Apple Safari before 17.3 on Apple Mac OS 12, Apple Mac OS 13, or Apple Mac OS 14 before 14.3 and is prone to a cross-domain policy vulnerability. A flaw is present in the application, which fails to properly handle the checks issue. On successful exploitation, a malicious website may cause unexpected cross-origin behavior.

The host is installed with Apple Mac OS 12 before 12.7.3, Apple Mac OS 13 before 13.6.4, or Apple Mac OS 14 before 14.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle the checks issue. On successful exploitation, an app may be able to corrupt coprocessor memory.

The host is installed with Apple Mac OS before 13.0 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle issues in data protection. On successful exploitation, an app may be able to modify protected parts of the file system.


Pages:      Start    105    106    107    108    109    110    111    112    113    114    115    116    117    118    ..   216

© SecPod Technologies