[Forgot Password]
Login  Register Subscribe

25354

 
 

132811

 
 

144795

 
 

909

 
 

116392

 
 

156

 
 
Paid content will be excluded from the download.

Filter
Matches : 11610 Download | Alert*

The host is installed with Apple Safari before 10.0.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly perform input validation. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Apple Safari before 10.0.3 and is prone to a cross-origin bypass vulnerability. A flaw is present in the application, which fails to properly handle page loading. Successful exploitation could allow attackers to exfiltrate data cross-origin.

The host is installed with Apple Safari before 10.0.3 and is prone to a cross-origin bypass vulnerability. A flaw is present in the application, which fails to properly handle page loading. Successful exploitation could allow attackers to exfiltrate data cross-origin.

The host is installed with Apple Safari before 10.0.3 and is prone to a cross-origin bypass vulnerability. A flaw is present in the application, which fails to properly handle variable validation. Successful exploitation could allow attackers to exfiltrate data cross-origin.

Mozilla Firefox before 51.0, Firefox ESR before 45.7 or Thunderbird 45.x before 45.7 :- Mozilla developers and community members reported memory safety bugs present in Firefox and Firefox ESR. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code.

Mozilla Firefox before 51.0, Firefox ESR before 45.7 or Thunderbird 45.x before 45.7 :- JIT code allocation can allow for a bypass of ASLR and DEP protections leading to potential memory corruption attacks.

Mozilla Firefox before 51.0, Firefox ESR before 45.7 or Thunderbird 45.x before 45.7 :- Use-after-free while manipulating XSL in XSLT documents

Mozilla Firefox before 51.0, Firefox ESR before 45.7 or Thunderbird 45.x before 45.7 :- Hashed codes of JavaScript objects are shared between pages. This allows for pointer leaks because an object's address can be discovered through hash codes, and also allows for data leakage of an object's content using these hash codes.

Mozilla Firefox before 51.0, Firefox ESR before 45.7 or Thunderbird 45.x before 45.7 :- A potential use-after-free found through fuzzing during DOM manipulation of SVG content.

Mozilla Firefox before 51.0, Firefox ESR before 45.7 or Thunderbird 45.x before 45.7 :- URLs containing certain unicode glyphs for alternative hyphens and quotes do not properly trigger punycode display, allowing for domain name spoofing attacks in the location bar.


Pages:      Start    1062    1063    1064    1065    1066    1067    1068    1069    1070    1071    1072    1073    1074    1075    ..   1160

© SecPod Technologies