[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248678

 
 

909

 
 

195426

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26448 Download | Alert*

The host is installed with Visual Studio 2017 or 2019 or 2022 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause unspecified impact.

The host is installed with Visual Studio 2017 or 2019 or 2022 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause unspecified impact.

The host is installed with Oracle Java SE through 6u171 or 7u161 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Serialization. Successful exploitation allows attackers to affect Availability.

The host is installed with SteelSeries GG 36.0.0 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle an unencrypted database that is writable for all users on the computer. Successful exploitation could allow attackers to trigger code execution with higher privileges.

The host is installed with SteelSeries GG 36.0.0 and is prone to a path traversal vulnerability. A flaw is present in the application, which fails to properly handle the open API listener that is used to create a sub-application. Successful exploitation could allow attackers to execute this sub-application automatically from a controlled location.

Microsoft OneNote Spoofing Vulnerability.

Mozilla Thunderbird 91.11, Mozilla Thunderbird 102: An OpenPGP digital signature includes information about the date when the signature was created. When displaying an email that contains a digital signature, the email's date will be shown. If the dates were different, then Thunderbird didn't report the email as having an invalid signature. If an attacker performed a replay attack, in which an old ...

Mozilla Firefox ESR 91.11, Mozilla Thunderbird 91.11 and Mozilla Thunderbird 102 : An attacker could have injected CSS into stylesheets accessible via internal URIs, such as resource:, and in doing so bypass a page's Content Security Policy.

Mozilla Thunderbird 91.10.0: When displaying the sender of an email, and the sender name contained the Braille Pattern Blank space character multiple times, Thunderbird would have displayed all the spaces. This could have been used by an attacker to send an email message with the attacker's digital signature, that was shown with an arbitrary sender email address chosen by the attacker. If the send ...

Mozilla Thunderbird 91.4.1 : Matrix chat library libolm bundled with Thunderbird vulnerable to a buffer overflow. Thunderbird users who use the Matrix chat protocol were vulnerable to a buffer overflow in libolm, that an attacker may trigger by a crafted sequence of messages. The overflow content is partially controllable by the attacker and limited to ASCII spaces and digits.


Pages:      Start    1418    1419    1420    1421    1422    1423    1424    1425    1426    1427    1428    1429    1430    1431    ..   2644

© SecPod Technologies