[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

111749

 
 

909

 
 

87255

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 13307 Download | Alert*

Adobe Shockwave Player before 11.5.7.609 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted ATOM size in a .dir (aka Director) file.

The Math.random function in the JavaScript implementation in Mozilla Firefox 3.5.10 through 3.5.11, 3.6.4 through 3.6.8, and 4.0 Beta1 uses a random number generator that is seeded only once per document object, which makes it easier for remote attackers to track a user, or trick a user into acting upon a spoofed pop-up message, by calculating the seed value, related to a "temporary footprint" and ...

The offline backup mechanism in Research In Motion (RIM) BlackBerry Desktop Software uses single-iteration PBKDF2, which makes it easier for local users to decrypt a .ipd file via a brute-force attack.

Multiple unspecified vulnerabilities in an ActiveX control in Adobe Reader and Acrobat 8.x before 8.2.5 and 9.x before 9.4 on Windows allow attackers to execute arbitrary code via unknown vectors.

The js_InitRandom function in the JavaScript implementation in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, uses the current time for seeding of a random number generator, which makes it easier for remote attackers to guess the seed value via a brute-force attack, a different vulnerability than CVE-2008-5913.

Mozilla Firefox 1.5, Netscape 8.0.4 and 7.2, and K-Meleon before 0.9.12 allows remote attackers to cause a denial of service (CPU consumption and delayed application startup) via a web site with a large title, which is recorded in history.dat but not processed efficiently during startup. NOTE: despite initial reports, the Mozilla vendor does not believe that this issue can be used to trigger a cr ...

The host is installed with Google Chrome before 22.0.1229.92 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to monitor plug-in crash. Successful exploitation could allow attackers to crash the service.

The host is installed with Google Chrome before 22.0.1229.92 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to crash the service.

The host is installed with Google Chrome before 22.0.1229.92 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle vectors related to a regular expression. Successful exploitation could allow attackers to crash the service.

The host is installed with Google Chrome before 22.0.1229.92 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle vectors related to audio devices. Successful exploitation could allow attackers to execute arbitrary code.


Pages:      Start    1139    1140    1141    1142    1143    1144    1145    1146    1147    1148    1149    1150    1151    1152    ..   1330

© SecPod Technologies