[Forgot Password]
Login  Register Subscribe

23631

 
 

126998

 
 

102010

 
 

909

 
 

80911

 
 

121

 
 
Paid content will be excluded from the download.

Filter
Matches : 1684 Download | Alert*

Security researchers Tyson Smith and JesseSchwartzentruber of the BlackBerry Security Automated Analysis Team used the Address Sanitizer tool while fuzzing to discover a user-after-free in the functions for synthetic mouse movement handling. Security researcher Atte Kettunen from OUSPG also reported a variant of the same flaw. This issue leads to a potentially exploitable crash.

Mozilla developer Eric Faust reported that during JavaScript compilation GetElementIC typed array stubs can be generated outside observed typesets. This could lead to unpredictable behavior with a potential security impact.

Google notified Mozilla that an intermediate certificate, which chains up to a root included in Mozilla's root store, was loaded into a man-in-the-middle (MITM) traffic management device. This certificate was issued by Agence nationale de la scurit des systmesd" information (ANSSI), an agency of the French government and a certificate authority in Mozilla's root program. A subordinate certificate ...

The host is missing a security update according to Adobe advisory, APSB14-19. The update is required to fix sandbox bypass vulnerability. The flaws are present in the applications, which fail to properly handle unspecified vectors. Successful exploitation allows attackers to bypass a sandbox protection mechanism, and consequently execute native code in a privileged context.

The host is missing a critical security update according to Microsoft security bulletin, MS13-099. The update is required to fix remote code execution vulnerability. The flaw is present in Microsoft Scripting Runtime Object Library, which fails to handle a website that hosts specially crafted content. Successful exploitation allows attackers to install programs; view, change, or delete data; or cr ...

The host is missing an important security update according to Microsoft security bulletin, MS14-044. The update is required to fix multiple elevation of privilege vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to stop responding until a manual reboot is initiated.

The host is missing a critical security update according to Adobe advisory, APSB08-23. The update is required to fix an unspecified vulnerability. The flaw is present in the application, which fails to properly handle unknown attack vectors. Successful exploitation allows context-dependent attackers to execute untrusted JavaScript in an AIR application.

The host is missing a critical security update according to Adobe advisory, APSB11-11. The update is required to fix a denial of service vulnerability. A flaw is present in the application, which fails to handle malicious XML data. Successful exploitation could allow remote attackers to cause a denial of service.

The host is missing a critical security update according to Adobe advisory, APSB11-20. The update is required to fix a denial of service vulnerability. A flaw is present in the application, which fails to avoid the memory corruption. Successful exploitation could allow remote attackers to cause a denial of service.

The host is missing a critical security update according to APSB10-19. The update is required to fix multiple denial of service vulnerabilities. The flaws are present in the application, which fails to properly handle memory and validate user input. Successful exploitation allows remote attackers to execute remote code.


Pages:      Start    149    150    151    152    153    154    155    156    157    158    159    160    161    162    ..   168

© 2013 SecPod Technologies