[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 8452 Download | Alert*

The host is installed with Apple Mac OS 14 before 14.3 or Apple Safari before 17.3 on Apple Mac OS 12, Apple Mac OS 13 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle issues in memory. On successful exploitation, processing web content may lead to arbitrary code execution.

The host is installed with Apple Mac OS 14 before 14.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle multiple memory corruption issues. On successful exploitation, processing maliciously crafted web content may lead to arbitrary code execution.

The host is installed with Apple Mac OS 14 before 14.3, Apple Mac OS 12 before 12.7.3, Apple Mac OS 13 before 13.6.4 or Apple Safari before 17.3 on Apple Mac OS 12, Apple Mac OS 13 and is prone to a type confusion vulnerability. A flaw is present in the application, which fails to properly handle issues in checks. On successful exploitation, processing maliciously crafted web content may lead to a ...

An issue was discovered in Dnsmasq through 15.7-1. A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise. This flaw is only exploitable durin ...

A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise. This flaw is only exploitable during the early boot phase, an attacker needs to perfor ...

The following vulnerabilities have been discovered in the WebKitGTK web engine: CVE-2024-23206 An anonymous researcher discovered that a maliciously crafted webpage may be able to fingerprint the user. CVE-2024-23213 Wangtaiyu discovered that processing web content may lead to arbitrary code execution. CVE-2024-23222 Apple discovered that processing maliciously crafted web content may lead to arbi ...

webkit2gtk: Web content engine library for GTK+ Several security issues were fixed in WebKitGTK.

The host is installed with Microsoft Edge before 121.0.2277.83 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could lead to a full compromise of the browser.

The host is installed with Microsoft Edge before 121.0.2277.83 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could lead to a full compromise of the browser.

The host is installed with Microsoft Edge before 121.0.2277.83 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.


Pages:      Start    562    563    564    565    566    567    568    569    570    571    572    573    574    575    ..   845

© SecPod Technologies