[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250363

 
 

909

 
 

196124

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26822 Download | Alert*

The host is installed with Apple iTunes through 12.0 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle issues in memory handling. Successful exploitation allows attackers to cause arbitrary code execution or denial of service via a crafted web site.

The host is installed with Apple iTunes through 12.0 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle issues in memory handling. Successful exploitation allows attackers to cause arbitrary code execution or denial of service via a crafted web site.

The host is installed with Apple iTunes through 12.0 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle issues in memory handling. Successful exploitation allows attackers to cause arbitrary code execution or denial of service via a crafted web site.

The host is installed with Apple iTunes through 12.0 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle issues in memory handling. Successful exploitation allows attackers to cause arbitrary code execution or denial of service via a crafted web site.

The host is installed with Apple iTunes through 12.0 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle issues in memory handling. Successful exploitation allows attackers to cause arbitrary code execution or denial of service via a crafted web site.

The host is installed with Apple iTunes through 12.0 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle issues in memory handling. Successful exploitation allows attackers to cause arbitrary code execution or denial of service via a crafted web site.

The host is installed with Apple iTunes through 12.0 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle issues in memory handling. Successful exploitation allows attackers to cause arbitrary code execution or denial of service via a crafted web site.

Mozilla Firefox ESR 102.8, Mozilla Thunderbird 102.8 : Mozilla developers Philipp and Gabriele Svelto reported memory safety bugs present in Firefox ESR 102.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

Mozilla Thunderbird 102.8 : If a MIME email combines OpenPGP and OpenPGP MIME data in a certain way Thunderbird repeatedly attempts to process and display the message, which could cause Thunderbird's user interface to lock up and no longer respond to the user's actions. An attacker could send a crafted message with this structure to attempt a DoS attack.

Mozilla Thunderbird 68.10: If an attacker intercepts Thunderbird's initial attempt to perform automatic account setup using the Microsoft Exchange autodiscovery mechanism, and the attacker sends a crafted response, then Thunderbird sends username and password over https to a server controlled by the attacker.


Pages:      Start    1493    1494    1495    1496    1497    1498    1499    1500    1501    1502    1503    1504    1505    1506    ..   2682

© SecPod Technologies