[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96078

 
 

909

 
 

78009

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 14020 Download | Alert*

Use-after-free vulnerability in the mozilla::DOMSVGLength::GetTearOff function in Mozilla Firefox before 32.0, Firefox ESR 31.x before 31.1, and Thunderbird 31.x before 31.1 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via an SVG animation with DOM interaction that triggers incorrect cycle collection.

Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 32.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.

Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 32.0, Firefox ESR 31.x before 31.1, and Thunderbird 31.x before 31.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.

The host is installed with Adobe Reader or Acrobat 10.x before 10.1.14 or 11.x before 11.0.11 and is prone to a denial of service vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service (memory corruption).

The host is installed with Adobe Reader or Acrobat 10.x before 10.1.14 or 11.x before 11.0.11 and is prone to multiple heap-based buffer overflow vulnerabilities. The flaws are present in the applications, which fail to handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with OpenSSL 1.0.1 before 1.0.1k, 1.0.0 before 1.0.0p or 0.9.8 before 0.9.8zd and is prone to a security bypass vulnerability. A flaw is present in the application, which does not enforce certain constraints on certificate data. Successful exploitation allows remote attackers to defeat a fingerprint-based certificate-blacklist protection mechanism by including crafted data wi ...

The host is installed with Oracle Java SE 6u85 and earlier, 7u72 and earlier or 8u25 and earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to Hotspot. Successful exploitation could allow attackers to affect confidentiality, integrity and availability.

The host is installed with Oracle Java SE 5.0u75 and earlier, 6u85 and earlier, 7u72 and earlier or 8u25 and earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to JSSE. Successful exploitation could allow attackers to affect confidentiality and integrity.

The host is installed with OpenSSL 1.0.1 before 1.0.1k, 1.0.0 before 1.0.0p or 0.9.8 before 0.9.8zd and is prone to a NULL pointer dereference vulnerability. A flaw is present in the application, which fails to handle a unknown vectors. Successful exploitation allows remote SSL servers to conduct ECDHE-to-ECDH downgrade attacks and trigger a loss of forward secrecy by omitting the ServerKeyExchang ...

The host is installed with OpenSSL 1.0.1 before 1.0.1k, 1.0.0 before 1.0.0p or 0.9.8 before 0.9.8zd and is prone to a security bypass vulnerability. A flaw is present in the application, which does not properly calculate the square of a BIGNUM value. Successful exploitation might make it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors, related to c ...


Pages:      Start    1380    1381    1382    1383    1384    1385    1386    1387    1388    1389    1390    1391    1392    1393    ..   1401

© 2013 SecPod Technologies