[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 17560 Download | Alert*

The host is installed with Apple Mac OS before 13.0 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle memory related issues. On successful exploitation, an app may be able to execute arbitrary code with kernel privileges.

The host is installed with Apple Mac OS 13 before 13.4.1 (a), or Apple Safari before 16.5.2 on Apple Mac OS 11 or Apple Mac OS 12 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle checks issue. Successful exploitation allow attackers to execute arbitrary code on processing web content.

The host is installed with Oracle Java SE through 8u401 or Apple Safari before 16.6.1 on Apple Mac OS 11, Apple Mac OS 12, or Apple Safari before 17.0 on Apple Mac OS 13, or Apple Mac OS before 14.0 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle issues in improved checks. On successful exploitation, processing web con ...

The host is installed with Oracle Java SE through 8u401 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to JavaFX (WebKitGTK). Successful exploitation allows attackers to affect confidentiality, integrity and availability.

The host is installed with Apple Mac OS 14 before 14.4, Apple Mac OS 12 before 12.7.4 or Apple Mac OS 13 before 13.6.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle issues in improved validation. On successful exploitation, an attacker with arbitrary kernel read and write capability may be able to bypass kernel memory protec ...

The host is installed with Foxit PDF Editor through 11.1.5.0913, or 12.x through 12.1.1.55342 and is prone to a use after free vulnerability. A flaw is present in the applications which fails to properly handle the use of null pointer or object that has been deleted or freed without proper validation. Successful exploitation could allow attackers to execute remote code or disclose information.

The host is installed with Microsoft Edge before 123.0.2420.81 and is prone to a spoofing vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Microsoft Edge before 123.0.2420.81 and is prone to a spoofing vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Wireshark 3.6.x before 3.6.23, 4.0.x before 4.0.15, or 4.2.x before 4.2.5 and is prone to a mismatched memory management routines vulnerability. A flaw is present in the application, which fails to properly handle issues in editcap command line utility. Successful exploitation allows atackers to cause denial of service via crafted capture file.

The host is installed with Wireshark 3.6.x before 3.6.23, 4.0.x before 4.0.15, or 4.2.x before 4.2.5 and is prone to an infinite loop vulnerability. A flaw is present in the application, which fails to properly handle issues in MONGO and ZigBee TLV dissector. Successful exploitation allows atackers to cause denial of service via packet injection or crafted capture file.


Pages:      Start    22    23    24    25    26    27    28    29    30    31    32    33    34    35    ..   1755

© SecPod Technologies