[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26831 Download | Alert*

Microsoft SharePoint Server Remote Code Execution Vulnerability.

The host is installed with Zoom Client before 5.17.5 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows an authenticated user to conduct a denial of service via network access.

Mozilla Firefox 126 : Memory safety bugs present in Firefox 125. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

Mozilla Firefox 126, Mozilla Firefox ESR 115.11.0 and Mozilla Thunderbird 115.11.0 : Memory safety bugs present in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

Mozilla Firefox 126 : A file dialog shown while in full-screen mode could have resulted in the window remaining disabled.

Mozilla Firefox 126 : An iterator stop condition was missing when handling WASM code in the built-in profiler, potentially leading to invalid memory access and undefined behavior. Note: This issue only affects the application when the profiler is running.

Mozilla Firefox 126 : The ShmemCharMapHashEntry() code was susceptible to potentially undefined behavior by bypassing the move semantics for one of its data members.

Mozilla Firefox 126 : When a network error occurred during page load, the prior content could have remained in view with a blank URL bar. This could have been used to obfuscate a spoofed web site.

Mozilla Firefox 126 : An HTTP digest authentication nonce value was generated using which could lead to predictable values.

Mozilla Firefox 126 : A memory allocation check was missing which would lead to a use-after-free if the allocation failed. This could have triggered a crash or potentially be leveraged to achieve code execution.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   2683

© SecPod Technologies