[Forgot Password]
Login  Register Subscribe

24547

 
 

132763

 
 

124222

 
 

909

 
 

106938

 
 

150

 
 
Paid content will be excluded from the download.

Filter
Matches : 10270 Download | Alert*

The host is installed with Apple Safari before 11.0.2 or Mozilla Firefox before 57.0.4 and is prone to a speculative execution branch target injection vulnerability. A flaw is present in the applications, which fails to properly handle targeted cache side-channel attacks. Successful exploitation could allow attackers to cross the syscall boundary and guest/host boundaries and read privileged memor ...

The host is installed with Apple Mac OS X through 10.13.6 or before 10.11.6 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a speculative execution of memory reads issue. Successful exploitation allows an attacker with local user access to disclose information via a side-channel analysis.

The host is installed with Oracle Weblogic Server 10.3.6.0, 12.1.3.0 or 12.2.1.3 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle unauthenticated network access. Successful exploitation results in takeover of Oracle WebLogic Server.

Mozilla Firefox 65.0.1, Mozilla Firefox ESR 60.5.1, Mozilla Thunderbird 60.7.2: A type confusion vulnerability can occur when manipulating JavaScript objects due to issues in Array.pop. This can allow for an exploitable crash. We are aware of targeted attacks in the wild abusing this flaw.

Insufficient vetting of parameters passed with the Prompt:Open IPC message between child and parent processes can result in the non-sandboxed parent process opening web content chosen by a compromised child process. When combined with additional vulnerabilities this could result in executing arbitrary code on the user's computer.

Insufficient vetting of parameters passed with the Prompt:Open IPC message between child and parent processes can result in the non-sandboxed parent process opening web content chosen by a compromised child process. When combined with additional vulnerabilities this could result in executing arbitrary code on the user's computer.

The host is installed with Apple Mac OS X 10.14.2 and is prone to multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to execute arbitrary code through a maliciously crafted SQL query.

The host is installed with Apple Mac OS X 10.14.2 and is prone to multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to execute arbitrary code through a maliciously crafted SQL query.

The host is installed with Apple Mac OS X 10.14.2 and is prone to multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker to execute arbitrary code through a maliciously crafted SQL query.

The host is installed with Apple Mac OS X or Server 10.12.4 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted SQL query. Successful exploitation could allow attackers to execute arbitrary code.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1026

© SecPod Technologies