[Forgot Password]
Login  Register Subscribe

24003

 
 

131401

 
 

103942

 
 

909

 
 

84044

 
 

133

 
 
Paid content will be excluded from the download.

Filter
Matches : 12311 Download | Alert*

The host is installed with Mozilla Firefox before 49.0 and is prone to a global buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle empty filters during canvas rendering. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Mozilla Firefox before 49.0 and is prone to an out-of-bounds vulnerability. A flaw is present in the application, which fails to properly handle text runs in some pages using display:contents. Successful exploitation allows remote attackers to disclose sensitive information.

The host is installed with Mozilla Firefox before 49.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation allows remote attackers to crash the service.

The host is installed with Mozilla Firefox before 49.0 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation allows remote attackers to send malicious add-on updates to execute arbitrary code.

The host is installed with Mozilla Firefox before 49.0 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle a CSP containing a referrer directive with no values. Successful exploitation allows remote attackers to crash the service.

The host is installed with Apple Safari before 3.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to crash the service.

The host is installed with Apple Safari before 3.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with PuTTY before 0.55 and is prone to multiple heap-based buffer overflow vulnerabilities. The flaws are present in the application, which fails to properly handle an SSH2 packet with a base argument that is larger than the mod argument, which causes the modpow function to write memory before the beginning of its buffer, and (2) remote malicious servers to cause a denial of ...

The host is installed with PuTTY before 0.56 and is prone to buffer overflow vulnerability. The flaw is present in the application, which fails to properly handle a SSH2_MSG_DEBUG packet with a modified stringlen parameter. Successful exploitation could allow remote attackers to execute arbitrary code.

The host is installed with OpenVPN before 2.3.12 and is prone to an information disclosure vulnerability. The flaw is present in the application, which fails to properly handle the 64-bit block ciphers such as 3DES and Blowfish. Successful exploitation allows remote attackers to recover plaintext when the same data is sent and can use cross-site scripting vulnerabilities to send data of interest.


Pages:      Start    1126    1127    1128    1129    1130    1131    1132    1133    1134    1135    1136    1137    1138    1139    ..   1231

© 2013 SecPod Technologies