[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

251782

 
 

909

 
 

196543

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 195805 Download | Alert*

The host is installed with Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3 or SeaMonkey before 2.31 and is prone to an use-after-free vulnerability. A flaw is present in the applications, which fail to handle a addition of a second root element to an HTML5 document during parsing. Successful exploitation allows attackers to execute arbitrary code.

The host is missing a security update according to MFSA 2014-87. The update is required to fix an use-after-free vulnerability. A flaw is present in the applications, which fail to handle a addition of a second root element to an HTML5 document during parsing. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3 or SeaMonkey before 2.31 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the applications, which fail to handle a crafted media content. Successful exploitation allows attackers to execute arbitrary code.

The host is missing a security update according to MFSA 2014-88. The update is required to fix a stack-based buffer overflow vulnerability. A flaw is present in the applications, which fail to handle a crafted media content. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3 or SeaMonkey before 2.31 and is prone to an arbitrary code execution vulnerability. A flaw is present in the applications, which fail to handle unknown vectors. Successful exploitation allows attackers to execute arbitrary code by leveraging an incorrect cast from the BasicThebesLayer data ...

The host is missing a security update according to MFSA 2014-89. The update is required to fix an arbitrary code execution vulnerability. A flaw is present in the applications, which fail to handle unknown vectors. Successful exploitation allows attackers to execute arbitrary code by leveraging an incorrect cast from the BasicThebesLayer data type to the BasicContainerLayer data type.

ntp: Network Time Protocol daemon and utility programs Several security issues were fixed in NTP.

The host is missing a security update according to Apple advisory, APPLE-SA-2014-12-22-1. The update is required to fix an arbitrary code execution vulnerability. The flaw is present in the application, which fails to handle a crafted packet, related to (1) the crypto_recv function when the Autokey Authentication feature is used, (2) the ctl_putdata function, and (3) the configure function. Succes ...

The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.1 and is prone to an arbitrary code execution vulnerability. The flaw is present in the application, which fails to handle a crafted packet, related to (1) the crypto_recv function when the Autokey Authentication feature is used, (2) the ctl_putdata function, and (3) the configure function. Successful exploitation allows a ...

The host is installed with Mozilla Network Security Services (NSS) before 3.16.2.4 or 3.17.x before 3.17.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which does not ensure that the DER encoding of an ASN.1 length is properly formed. Successful exploitation allows remote attackers to conduct data-smuggling attacks by using a long byte sequence for an encodin ...


Pages:      Start    7745    7746    7747    7748    7749    7750    7751    7752    7753    7754    7755    7756    7757    7758    ..   19580

© SecPod Technologies