[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26496 Download | Alert*

The host is installed with Google Chrome before 77.0.3865.75 and is prone to an improper input validation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 77.0.3865.75 and is prone to an improper input validation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 77.0.3865.75 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows a remote attacker to potentially exploit heap corruption via a crafted HTML page

The host is installed with Google Chrome before 78.0.3904.70 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows a remote attacker to potentially exploit heap corruption via a crafted HTML page.

The host is installed with TeamViewer version 14.3.4730 and is prone to an information disclosure vulnerability. A flaw is present in application which fails to properly handle the chat functionality of the TeamViewer desktop application. Successful exploitation allows attackers to read the previously done chat with other peers by previously logged in user.

The host is installed with Avast Antivirus 20.1.5069.562 and is prone to an information disclosure vulnerability. A flaw exists in the application. which fails to handle an issue Avast password manager. Successful exploitation allow attackers to disclose sensitive account information.

The host is installed with Google Chrome before 84.0.4147.105 and is prone to a type confusion vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 85.0.4183.83 and Microsoft Edge Chromium before 85.0.564.41 and is prone to an insufficient policy enforcement vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 85.0.4183.83 and is prone to an incorrect security UI vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 85.0.4183.83 and Microsoft Edge Chromium before 85.0.564.41 and is prone to an insufficient policy enforcement vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.


Pages:      Start    1053    1054    1055    1056    1057    1058    1059    1060    1061    1062    1063    1064    1065    1066    ..   2649

© SecPod Technologies