[Forgot Password]
Login  Register Subscribe

25354

 
 

132805

 
 

136938

 
 

909

 
 

113195

 
 

156

 
 
Paid content will be excluded from the download.

Filter
Matches : 11087 Download | Alert*

The host is installed with Oracle Java SE through 7u241, 8u231, 11.0.5 or 13.0.1 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Serialization. Successful exploitation allows attackers to affect availability.

The host is installed with Wireshark 2.6.0 to 2.6.5 or 2.4.0 to 2.4.11 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle issues in epan/charsets.c file. Successful exploitation allows attackers to crash the RTSE dissector.

The host is installed with Oracle Java SE through 8u231 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to JavaFX (SQLite). Successful exploitation allows attackers to affect availability.

The host is installed with Apple Mac OS X 10.15.x before 10.15.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues in tcpdump. Successful exploitation allows an attacker to encounter multiple issues.

The host is installed with Apple Mac OS X 10.15.x before 10.15.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues in tcpdump. Successful exploitation allows an attacker to encounter multiple issues.

The host is installed with Oracle Java SE through 8u231 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to JavaFX (libxslt). Successful exploitation allows attackers to affect integrity.

The host is installed with Oracle Java SE through 8u231 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to JavaFX (libxslt). Successful exploitation allows attackers to affect confidentiality.

Mozilla Firefox 72, Mozilla Firefox ESR 68.4 and Mozilla Thunderbird 64.8.1: Due to a missing case handling object types, a type confusion vulnerability could occur, resulting in a crash. We presume that with enough effort that it could be exploited to run arbitrary code.

Mozilla Firefox 72, Mozilla Firefox ESR 68.4 and Mozilla Thunderbird 68.4.1 : Mozilla developers Jason Kratzer, Christian Holler, and Bob Clary reported memory safety bugs present in Firefox 71 and Firefox ESR 68.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

Mozilla Firefox 72, Mozilla Firefox ESR 68.4 and Mozilla Thunderbird 68.4.1 : When pasting a style tag from the clipboard into a rich text editor, the CSS sanitizer does not escape < and > characters. Because the resulting string is pasted directly into the text node of the element this does not result in a direct injection into the webpage; however, if a webpage subsequently copies the node's inn ...


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1108

© SecPod Technologies