[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15795 Download | Alert*

The host is installed with Apple Safari before 6.2.1, 7.x before 7.1.1 or 8.x before 8.0.1 and is prone to multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Apple Safari before 6.2.1, 7.x before 7.1.1 or 8.x before 8.0.1 and is prone to multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Apple Safari before 6.2.1, 7.x before 7.1.1 or 8.x before 8.0.1 and is prone to multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Apple Safari before 6.2.1, 7.x before 7.1.1 or 8.x before 8.0.1 and is prone to multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Google Chrome before 13.0.782.215 or Apple Safari before 5.1.4 and is prone to a use-after-free vulnerability. A flaw is present in the applications, which fail to handle user supplied input. Successful exploitation could allow attackers to crash the service or cause other unknown impact.

The host is installed with Apple Safari before 6.2.3, 7.x before 7.1.3 or 8.x before 8.0.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation allows attackers to execute arbitrary code or crash the service.

The host is installed with Apple Safari before 6.2.3, 7.x before 7.1.3 or 8.x before 8.0.3 and is prone to an unspecified memory corruption vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation allows attackers to execute arbitrary code or crash the service.

Mozilla Thunderbird 68.10: If an attacker intercepts Thunderbird's initial attempt to perform automatic account setup using the Microsoft Exchange autodiscovery mechanism, and the attacker sends a crafted response, then Thunderbird sends username and password over https to a server controlled by the attacker.

Mozilla Thunderbird 60.5 : A use-after-free vulnerability can occur while playing a sound notification in Thunderbird. The memory storing the sound data is immediately freed, although the sound is still being played asynchronously, leading to a potentially exploitable crash.

Mozilla Thunderbird 60.5 : A crash can occur when processing a crafted S/MIME message or an XPI package containing a crafted signature. This can be used as a denial-of-service (DOS) attack because Thunderbird reopens the last seen message on restart, triggering the crash again.


Pages:      Start    987    988    989    990    991    992    993    994    995    996    997    998    999    1000    ..   1579

© SecPod Technologies