[Forgot Password]
Login  Register Subscribe

24003

 
 

131486

 
 

106342

 
 

909

 
 

84662

 
 

134

 
 
Paid content will be excluded from the download.

Filter
Matches : 8738 Download | Alert*

The host is installed with Google Chrome before 66.0.3359.170 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 66.0.3359.170 and is prone to a heap buffer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Apple Safari before 11.0.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation may lead to arbitrary code execution.

The host is installed with Apple Safari before 10.1 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation may exfiltrate data cross-origin.

The host is installed with Apple Safari before 10.1 and is prone to an universal cross site script vulnerability. A flaw is present in the application, which fails to properly handle a maliciously crafted web page. Successful exploitation may lead to universal cross site scripting.

The host is installed with Apple Mac OS 10.8 before 10.13 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle additional entitlements. Successful exploitation allows remote attackers to access the FileVault unlock key.

The host is installed with Apple Mac OS 10.8 before 10.13 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a logic error in kext loading. Successful exploitation allows attackers to execute arbitrary code system privileges.

The host is installed with Apple Mac OS 10.8 before 10.13 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly perform access restrictions. Successful exploitation allows attackers to display results for files not belonging to the user.

The host is installed with Apple Mac OS X 10.11.6 or 10.12.6 and is prone to an information access vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted webpages. Successful exploitation allows an application to mount a disk image.

The host is installed with Apple Mac OS X 10.13.2 or 10.12.6 and is prone to a remote code execution vulnerability. The flaw is present in the application, which fails to properly handle a memory corruption issue. Successful exploitation allows attackers to execute an arbitrary code by processing a maliciously crafted audio file.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   873

© 2013 SecPod Technologies