[Forgot Password]
Login  Register Subscribe

24547

 
 

132763

 
 

123775

 
 

909

 
 

102573

 
 

150

 
 
Paid content will be excluded from the download.

Filter
Matches : 13930 Download | Alert*

Mozilla Firefox 66, Mozilla Firefox ESR 60.6 : The type inference system allows the compilation of functions that can cause type confusions between arbitrary objects when compiled through the IonMonkey just-in-time (JIT) compiler and when the constructor function is entered through on-stack replacement (OSR). This allows for possible arbitrary reading and writing of objects during an exploitable c ...

Mozilla Firefox 66, Mozilla Firefox ESR 60.6 : A use-after-free vulnerability can occur when a raw pointer to a DOM element on a page is obtained using JavaScript and the element is then removed while still in use. This results in a potentially exploitable crash.

Mozilla Firefox 66 : Mozilla developers and community members Dragana Damjanovic, Emilio Cobos Alvarez, Henri Sivonen, Narcis Beleuzu, Julian Seward, Marcia Knous, Gary Kwong, Tyson Smith, Yaron Tausky, Ronald Crane, and Andre Bargull reported memory safety bugs present in Firefox 65. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these ...

Mozilla Firefox 66, Mozilla Firefox ESR 60.6 : Mozilla developers and community members Bob Clary, Chun-Min Chang, Aral Yaman, Andreea Pavel, Jonathan Kew, Gary Kwong, Alex Gaynor, Masayuki Nakano, and Anne van Kesteren reported memory safety bugs present in Firefox 65 and Firefox ESR 60.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of ...

The host is installed with Google Chrome before 72.0.3626.121 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to handle crafted html page. Successful exploitation allows attackers execute arbitrary code in the context of the browser.

The host is installed with OpenSSL 1.0.2 through 1.0.2q and is prone to a padding oracle attack vulnerability. The vulnerability is present in the SSL_shutdown() method used in conjunction with non-stitched ciphersuites. On successful exploitation, an attacker could decrypt data using the padding oracle.

The host is installed with Google Chrome before 72.0.3626.81 and is prone to an injection attack vulnerability. A flaw is present in the application, which fails to handle crafted html page. Successful exploitation allows attackers to perform a dangling markup injection attack via a crafted html page.

The host is installed with Acrobat DC Classic or Acrobat Reader DC Classic before 2015.006.30482, Acrobat DC Continuous or Acrobat Reader DC Continuous before 2019.010.20098, Acrobat 2017 or Acrobat Reader 2017 before 2017.011.30127 and is prone to a data leakage vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation could lead to in ...

The host is installed with Thunderbird before 60.5.1 and is prone to a signature spoofing vulnerability. A flaw is present in the application, which fails to handle S/MIME signatures. Successful exploitation allows an attacker to reuse a valid S/MIME signature to craft an email message with arbitrary content..

The host is installed with Acrobat DC Classic or Acrobat Reader DC Classic before 2015.006.30475, Acrobat DC Continuous or Acrobat Reader DC Continuous before 2019.010.20091, Acrobat 2017 or Acrobat Reader 2017 before 2017.011.30120 and is prone to an our-of-bounds read vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation could lea ...


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1392

© SecPod Technologies