[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14857 Download | Alert*

Mozilla Firefox ESR or Thunderbird before 52.8 :A buffer overflow was found during UTF8 to Unicode string conversion within JavaScript with extremely large amounts of data. This vulnerability requires the use of a malicious or vulnerable legacy extension in order to occur.

Mozilla Firefox ESR or Thunderbird before 52.8 : Mozilla developers backported selected changes in the Skia library to the ESR52 branch of Firefox. These changes correct memory corruption issues including invalid buffer reads and writes during graphic operations.

Mozilla Thunderbird before 52.8 : Using remote content in encrypted messages can lead to the disclosure of plaintext.

Mozilla Thunderbird before 52.8 : Crafted message headers can cause a Thunderbird process to hang on receiving the message.

Mozilla Thunderbird before 52.8 : Plaintext of decrypted emails can leak through the src attribute of remote images, or links.

Mozilla Thunderbird before 52.8 : It is possible to spoof the filename of an attachment and display an arbitrary attachment name. This could lead to a user opening a remote attachment which is a different file type than expected.

Mozilla Thunderbird before 52.8 : Plaintext of decrypted emails can leak through by user submitting an embedded form.

An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on ...

The host is installed with the Microsoft Windows, VMware Workstation 14.x before 14.1.2 or VMware Player 14.x before 14.1.2 and is prone to a speculative store bypass vulnerability. The application fails to properly handle speculative execution control mechanism issues. On successful exploitation, an attacker could cause information disclosure in applications and/or execution runtimes which rely o ...

The host is installed with Ghostscript through 9.20 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle an unknown input to the -dSAFER argument. Successful exploitation could allow attackers to determine the existence and size of arbitrary files.


Pages:      Start    8    9    10    11    12    13    14    15    16    17    18    19    20    21    ..   1485

© SecPod Technologies