[Forgot Password]
Login  Register Subscribe

25354

 
 

132811

 
 

146457

 
 

909

 
 

117103

 
 

156

 
 
Paid content will be excluded from the download.

Filter
Matches : 17168 Download | Alert*

The host is installed with ImageMagick 7.0.8-50 Q16 and is prone to a stack-based buffer overflow vulnerability. The flaws are present in coders/pnm.c in WritePNMImage, which fails to handle off-by-one errors. Successful exploitation could allows an attackers to execute arbitrary code.

The host is installed with ImageMagick 7.0.8-50 Q16 and is prone to a stack-based buffer overflow vulnerability. The flaws are present in coders/pnm.c in WritePNMImage, which fails to handle misplaced assignment. Successful exploitation could allows an attackers to execute arbitrary code.

The host is installed with ImageMagick 7.0.8-50 Q16 and is prone to a resource management errors vulnerability. The flaws are present in MagickCore/statistic.c in EvaluateImages, which fails to handle columns. Successful exploitation could allows an attackers to execute arbitrary code.

The host is installed with Pale Moon before 27.9.3 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to handle the DOMProxyHandler::EnsureExpandoObject function issue. Successful exploitation allows attackers to perform a use-after-free attack.

Mozilla Firefox 75, Mozilla Firefox ESR 68.7 and Mozilla Thunderbird 68.7.0 : On 32-bit builds, an out of bounds write could have occurred when processing an image larger than 4 GB in <code>GMPDecodeData</code>. It is possible that with enough effort this could have been exploited to run arbitrary code.

Mozilla Firefox 76, Mozilla Firefox ESR 68.8 and Mozilla Thunderbird 68.8 : A buffer overflow could occur when parsing and validating SCTP chunks in WebRTC. This could have led to memory corruption and a potentially exploitable crash.

Mozilla Firefox 77, Mozilla Firefox ESR 68.9 and Mozilla Thunderbird 68.9.0 : Mozilla developers Tom Tung and Karl Tomlinson reported memory safety bugs present in Firefox 76 and Firefox ESR 68.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

Mozilla Firefox 77, Mozilla Firefox ESR 68.9 and Mozilla Thunderbird 68.9.0 : Mozilla Developer Iain Ireland discovered a missing type check during unboxed objects removal, resulting in a crash. We presume that with enough effort that it could be exploited to run arbitrary code.

Mozilla Firefox 77, Mozilla Firefox ESR 68.9 and Mozilla Thunderbird 68.9.0 : When browsing a malicious page, a race condition in our SharedWorkerService could occur and lead to a potentially exploitable crash.

Mozilla Firefox 77, Mozilla Firefox ESR 68.9 and Mozilla Thunderbird 68.9.0 : NSS has shown timing differences when performing DSA signatures, which was exploitable and could eventually leak private keys.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1716

© SecPod Technologies