[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 17483 Download | Alert*

Microsoft Office Remote Code Execution Vulnerability.

The host is installed with Microsoft Edge before 120.0.2210.133 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could lead to a browser sandbox escape.

The host is installed with Apple Mac OS 14 before 14.4, Apple Mac OS 12 before 12.7.4 or Apple Mac OS 13 before 13.6.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle issues in improved validation. On successful exploitation, an attacker with arbitrary kernel read and write capability may be able to bypass kernel memory protec ...

The host is installed with Apple Mac OS 14 before 14.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle issues in improved validation. On successful exploitation, an attacker with arbitrary kernel read and write capability may be able to bypass kernel memory protections.

The host is installed with Apple Mac OS 13 before 13.6.7 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle issues in validation. On successful exploitation, an attacker with arbitrary kernel read and write capability may be able to bypass kernel memory protections.

The host is installed with Foxit PDF Editor through 11.1.5.0913, or 12.x through 12.1.1.55342 and is prone to a use after free vulnerability. A flaw is present in the applications which fails to properly handle the use of null pointer or object that has been deleted or freed without proper validation. Successful exploitation could allow attackers to execute remote code or disclose information.

The host is installed with Google Chrome before 125.0.6422.60 or Microsoft Edge before 124.0.2478.109 and is prone to a type confusion vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 125.0.6422.112, or Microsoft Edge before 125.0.2535.67 and is prone to a type confusion vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Microsoft Edge before 123.0.2420.81 and is prone to a spoofing vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Microsoft Edge before 123.0.2420.81 and is prone to a spoofing vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1748

© SecPod Technologies