[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15162 Download | Alert*

The host is installed with Microsoft .NET Framework 2.0 SP2, 3.5.1, 4 or 4.5 or Silverlight 5 before 5.1.20513.0 and is prone to array access violation vulnerability. A flaw is present in the applications, which fail to properly prevent changes to data in multidimensional arrays of structures. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Microsoft Silverlight 5 before 5.1.20513.0 and is prone to null pointer vulnerability. A flaw is present in the application, which fails to properly initialize arrays. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service.

The host is installed with Microsoft Office 2003 SP3 /2007 SP3 /2010 SP1, Windows, Visual Studio .NET 2003 SP1, Lync 2010, Lync Basic 2013 or Lync 2010 Attendee, and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to properly process crafted TrueType font (TTF) file. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Oracle Java SE 7 update 40 and earlier and is prone to unspecified vulnerability. The flaw is present in the application, which fails to handle vectors related to deployment. Successful exploitation allows remote attackers to affect confidentiality, integrity and availability.

The host is installed with Apache Subversion 1.7.11 through 1.7.12 or 1.8.0 through 1.8.4 and is prone to denial of service vulnerability. The flaw is present in get_parent_resource function in repos.c in mod_dav_svn Apache HTTPD server module in Apache Subversion, which fails to properly handle a non-canonical URL in a request, as demonstrated using a trailing /. Successful exploitation allows re ...

Mozilla Firefox 117, Mozilla Firefox ESR 115.2.0, Mozilla Thunderbird 102.15, Mozilla Thunderbird 115.2: When receiving rendering data over IPC code mStream could have been destroyed when initialized, which could have led to a use-after-free causing a potentially exploitable crash.

Mozilla Firefox 117, Mozilla Firefox ESR 115.2.0, Mozilla Thunderbird 102.15, Mozilla Thunderbird 115.2: When creating a callback over IPC for showing the Color Picker window, multiple of the same callbacks could have been created at a time and eventually all simultaneously destroyed as soon as one of the callbacks finished. This could have led to a use-after-free causing a potentially exploitable ...

Mozilla Firefox 117, Mozilla Firefox ESR 115.2.0, Mozilla Thunderbird 102.15, Mozilla Thunderbird 115.2: When creating a callback over IPC for showing the File Picker window, multiple of the same callbacks could have been created at a time and eventually all simultaneously destroyed as soon as one of the callbacks finished. This could have led to a use-after-free causing a potentially exploitable ...

Mozilla Firefox 117, Mozilla Firefox ESR 115.2.0, Mozilla Thunderbird 102.15, Mozilla Thunderbird 115.2: On Windows, an integer overflow could occur in code RecordedSourceSurfaceCreation which resulted in a heap buffer overflow potentially leaking sensitive data that could have led to a sandbox escape.

Mozilla Firefox 117, Mozilla Firefox ESR 115.2.0, Mozilla Thunderbird 115.2 : When code UpdateRegExpStatics attempted to access code initialStringHeap it could already have been garbage collected prior to entering the function, which could potentially have led to an exploitable crash.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1516

© SecPod Technologies