[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14848 Download | Alert*

The host is installed with Python 3.2 through 3.5 and is prone to a race condition vulnerability. A flaw is present in the application, which fails to properly handle crafted input. Successful exploitation could allow attackers to crash the service.

The host is installed with Python before 2.7.16 or 3.0.x before 3.6.9 and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle a crafted X509 certificate. Successful exploitation allows attacker to cause a NULL pointer dereference, resulting in a denial of service.

The host is installed with Python before 2.6.8, 2.7.x before 2.7.3, 3.2.x before 3.2.3 or 3.x through 3.1.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle crafted input to an application that maintains a hash table. Successful exploitation could allow attackers to crash the service.

The host is installed with Python before before 2.6.8, 2.7.x before 2.7.3, 3.2.x before 3.2.3 or 3.x through 3.1.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle crafted XML-RPC POST. Successful exploitation could allow attackers to crash the service.

The host is installed with OpenVPN 2.4.x before 2.4.9 and is prone to an illegal client float vulnerability. A flaw is present in the application, which fails to properly handle data channel v2 (P_DATA_V2) packet. Successful exploitation could allow attackers to drop victim's connection.

Mozilla Firefox before 60.0, Firefox, Thunderbird or ESR before 52.8 : Mozilla developers and community members Christoph Diehl, Randell Jesup, Tyson Smith, Alex Gaynor, Ronald Crane, Julian Hector, Kannan Vijayan, and Jason Kratzer reported memory safety bugs present in Firefox and Firefox ESR. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that som ...

Mozilla Firefox before 60.0, Firefox, Thunderbird or ESR before 52.8 : A use-after-free vulnerability can occur while adjusting layout during SVG animations with text paths. This results in a potentially exploitable crash.

Mozilla Firefox before 60.0, Firefox, Thunderbird or ESR before 52.8 : An integer overflow can occur in the Skia library due to 32-bit integer use in an array without integer overflow checks, resulting in possible out-of-bounds writes. This could lead to a potentially exploitable crash triggerable by web content.

Mozilla Firefox before 60.0, Firefox, Thunderbird or ESR before 52.8 : Sites can bypass security checks on permissions to install lightweight themes by manipulating the baseURI property of the theme element. This could allow a malicious site to install a theme without user interaction which could contain offensive or embarrassing images.

Mozilla Firefox ESR before 52.8 or Thunderbird before 52.8: A use-after-free vulnerability can occur while enumerating attributes during SVG animations with clip paths. This results in a potentially exploitable crash.


Pages:      Start    2    3    4    5    6    7    8    9    10    11    12    13    14    15    ..   1484

© SecPod Technologies