[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 9521 Download | Alert*

The host is installed with Google Chrome before 85.0.4183.121 or Microsoft Edge Chromium before 85.0.564.63 and is prone to an insufficient data validation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 85.0.4183.121 or Microsoft Edge Chromium before 85.0.564.63 and is prone to an insufficient policy enforcement vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 85.0.4183.121 or Microsoft Edge Chromium before 85.0.564.63 and is prone to an insufficient policy enforcement vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 85.0.4183.121 or Microsoft Edge Chromium before 85.0.564.63 and is prone to an insufficient policy enforcement vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 85.0.4183.121 or Microsoft Edge Chromium before 85.0.564.63 and is prone to an out of bounds read vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 85.0.4183.102 or Microsoft Edge Chromium before 85.0.564.51 and is prone to an insufficient policy enforcement vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

An elevation of privilege vulnerability exists in Microsoft Edge (Chromium-based) before 84.0.522.40 when DLL files are allowed to download without prompting additional warning to the user. An attacker who successfully exploited this vulnerability could drop the DLL files on the users Download folder (or equivalent) and gain elevated privileges. To exploit the vulnerability, the user must browse t ...

An elevation of privilege vulnerability exists in Microsoft Edge (Chromium-based) when DLL files are allowed to download without prompting additional warning to the user. An attacker who successfully exploited this vulnerability could drop the DLL files on the users Download folder (or equivalent) and gain elevated privileges. NOTE: This vulnerability is currently awaiting analysis.

An elevation of privilege vulnerability exists in Microsoft Edge (Chromium-based) when the Feedback extension improperly validates input. An attacker who successfully exploited this vulnerability could write files to arbitrary locations and gain elevated privileges. The vulnerability by itself does not allow arbitrary code to run. However, this vulnerability could be used in conjunction with one o ...

Mozilla Firefox 74, Mozilla Firefox ESR 68.6, Mozilla Thunderbird 68.6, Google Chrome 80.0.3987.149 and Microsoft Edge 80.0.3987.149: The inputs to sctp_load_addresses_from_init are verified by sctp_arethere_unrecognized_parameters however, the two functions handled parameter bounds differently, resulting in out of bounds reads when parameters are partially outside a chunk.


Pages:      Start    269    270    271    272    273    274    275    276    277    278    279    280    281    282    ..   952

© SecPod Technologies