[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

114411

 
 

909

 
 

88812

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 9411 Download | Alert*

Mozilla Firefox 62, Mozilla Firefox ESR 60.2, Mozilla Thunderbird 60.2.1 : A use-after-free vulnerability can occur when refresh driver timers are refreshed in some circumstances during shutdown when the timer is deleted while still in use. This results in a potentially exploitable crash.

The host is installed with Apple Mac OS X or Server 10.12.5 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation could allow attackers to gain kernel privileges.

The host is installed with Apple Mac OS X or Server 10.12.5 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to have unspecified impact.

The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to curl. Successful exploitation could allow attackers to leak sensitive user information.

The host is installed with Apple Mac OS X or Server 10.12.x through 10.12.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to curl. Successful exploitation could allow attackers to leak sensitive user information.

The host is installed with Apple Mac OS X 10.6 through 10.6.8 or Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to information Disclosure Vulnerability. The flaw is present in the The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, which does not properly consider timing side-channel ...

The host is installed with Apple Mac OS X 10.5.8 or Apple Mac OS X 10.6 before 10.6.2 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted TIFF image. Successful exploitation could allow attackers to crash the service or execute arbitrary code.

The host is installed with Adobe Flash Player 9.x up to 9.0.48.0, Adobe Reader 7.x before 7.1.0 or 8.x and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the applications, which fail to handle a singleton Unicode sequence in a character class. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Inkscape before 0.41.0 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle symlink attack on the tmpepsifile.epsi temporary file. Successful exploitation could allow attackers to cause a denial of service or loss of data within the context of the affected application.

Mozilla Firefox before 53.0, Thunderbird before 52.1, Firefox ESR before 45.9 or 52.x before 52.1 :- An out-of-bounds write during Base64 decoding operation in the Network Security Services (NSS) library due to insufficient memory being allocated to the buffer. This results in a potentially exploitable crash.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   941

© SecPod Technologies