[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 17029 Download | Alert*

The host is installed with Google Chrome before 89.0.4389.128 or Edge Chromium before 89.0.774.77 and is prone to an insufficient validation of untrusted vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Microsoft Edge before 124.0.2478.51 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause sensitive information discloser.

Mozilla Firefox 125 : Memory safety bugs present in Firefox 124. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

Mozilla Firefox 125 : The MarkStack assignment operator, part of the JavaScript engine, could access uninitialized memory if it were used in a self-assignment.

Mozilla Firefox 125 : An out-of-memory condition during object initialization could result in an empty shape list. If the JIT subsequently traced the object it would crash.

Mozilla Firefox 125 : It was possible to mutate a JavaScript object so that the JIT could crash while tracing it.

Mozilla Firefox 125 : A use-after-free could occur during WASM execution if garbage collection ran during the creation of an array.

Mozilla Firefox 125 : In certain cases the JIT incorrectly optimized MSubstr operations, which led to out-of-bounds reads.

Mozilla Firefox 125 : A use-after-free could result if a JavaScript realm was in the process of being initialized when a garbage collection started.

The host is installed with Acrobat DC Continuous or Acrobat Reader DC Continuous before 23.008.20533, Acrobat DC 2020 or Acrobat Reader DC 2020 before 20.005.30574 and is prone to an out-of-bounds write vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation could lead to arbitrary code execution.


Pages:      Start    2    3    4    5    6    7    8    9    10    11    12    13    14    15    ..   1702

© SecPod Technologies