[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247974

 
 

909

 
 

194654

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26350 Download | Alert*

The host is installed with Apple iTunes before 12.12.4and is prone to an integer overflow vulnerability. A flaw is present in the applications, which fail to properly handle issues in input validation. On successful exploitation, a remote attacker may be able to cause unexpected application termination or arbitrary code execution.

The host is installed with Apple iTunes before 12.12.4and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to properly handle issues in input validation. On successful exploitation, processing a maliciously crafted image may lead to arbitrary code execution.

The host is installed with Apple iTunes before 12.12.4and is prone to a privilege escalation vulnerability. A flaw is present in the applications, which fail to properly handle issues in state management. On successful exploitation, a local attacker may be able to elevate their privileges.

The host is installed with Apple iTunes before 12.12.4and is prone to a logic vulnerability. A flaw is present in the applications, which fail to properly handle issues in state management. On successful exploitation, an application may be able to delete files for which it does not have permission.

The host is installed with OpenSSL 1.0.2 through 1.0.2zb or 1.1.1 through 1.1.1l or 3.0.0 and is prone to an information disclosure vulnerability. A flaw is present in the MIPS32 and MIPS64 squaring procedure, where there is a carry propagation bug. Successful exploitation could allow attackers to perform information disclosure.

The host is installed with OpenSSL 1.1.1 through 1.1.1p or 3.0.0 through 3.0.4 and is prone to an information disclosure vulnerability. A flaw is present in the AES OCB mode for 32-bit x86 which fails to properly encrypt the entirety of the data under some circumstances. On successful exploitation, it could reveal sixteen bytes of data that was preexisting in the memory that wasn't written. In the ...

The host is installed with OpenSSL 3.0.0 before 3.0.3 and is prone to an improper certificate validation vulnerability. A flaw is present in the application which fails to handle an issue in the OCSP_basic_verify function. Successful exploitation could allow an attacker to trick the command line application report that the verification of an ocsp response with the "-no_cert_checks" option to be su ...

The host is installed with OpenSSL 3.0.0 before 3.0.3 and is prone to a denial of service vulnerability. A flaw is present in the application which fails to handle an issue in the OPENSSL_LH_flush() function. Successful exploitation could allow an attacker to cause a long lived process when periodically decoding certificates or keys, its memory usage to expand without bounds and the process to be ...

The host is installed with Google Chrome before 103.0.5060.114 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 103.0.5060.134 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.


Pages:      Start    1192    1193    1194    1195    1196    1197    1198    1199    1200    1201    1202    1203    1204    1205    ..   2634

© SecPod Technologies