[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

247085

 
 

909

 
 

194218

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14840 Download | Alert*

The host is installed with ImageMagick 7.x before 7.0.8-41 or 6.x before 6.9.10-41 and is prone to a divide by zero vulnerability. The flaws are present in the MeanShiftImage function, which fails to handle crafted file. Successful exploitation could allows an attackers to cause a denial-of-service.

The host is installed with ImageMagick 7.x before 7.0.8-42 or 6.x before 6.9.10-42 and is prone to a use-after-free vulnerability. The flaws are present in the UnmapBlob function, which fails to handle crafted file. Successful exploitation could allows an attackers to cause a denial-of-service.

The host is installed with Oracle Java SE 7 update 40 and earlier and is prone to unspecified vulnerability. The flaw is present in the application, which fails to handle vectors related to deployment. Successful exploitation allows remote attackers to affect confidentiality, integrity and availability.

The host is installed with Apache Subversion 1.7.11 through 1.7.12 or 1.8.0 through 1.8.4 and is prone to denial of service vulnerability. The flaw is present in get_parent_resource function in repos.c in mod_dav_svn Apache HTTPD server module in Apache Subversion, which fails to properly handle a non-canonical URL in a request, as demonstrated using a trailing /. Successful exploitation allows re ...

Mozilla Firefox 117, Mozilla Firefox ESR 115.2.0, Mozilla Thunderbird 102.15, Mozilla Thunderbird 115.2: When receiving rendering data over IPC code mStream could have been destroyed when initialized, which could have led to a use-after-free causing a potentially exploitable crash.

Mozilla Firefox 117, Mozilla Firefox ESR 115.2.0, Mozilla Thunderbird 102.15, Mozilla Thunderbird 115.2: When creating a callback over IPC for showing the Color Picker window, multiple of the same callbacks could have been created at a time and eventually all simultaneously destroyed as soon as one of the callbacks finished. This could have led to a use-after-free causing a potentially exploitable ...

Mozilla Firefox 117, Mozilla Firefox ESR 115.2.0, Mozilla Thunderbird 102.15, Mozilla Thunderbird 115.2: When creating a callback over IPC for showing the File Picker window, multiple of the same callbacks could have been created at a time and eventually all simultaneously destroyed as soon as one of the callbacks finished. This could have led to a use-after-free causing a potentially exploitable ...

Mozilla Firefox 117, Mozilla Firefox ESR 115.2.0, Mozilla Thunderbird 102.15, Mozilla Thunderbird 115.2: On Windows, an integer overflow could occur in code RecordedSourceSurfaceCreation which resulted in a heap buffer overflow potentially leaking sensitive data that could have led to a sandbox escape.

Mozilla Firefox 117, Mozilla Firefox ESR 115.2.0, Mozilla Thunderbird 115.2 : When code UpdateRegExpStatics attempted to access code initialStringHeap it could already have been garbage collected prior to entering the function, which could potentially have led to an exploitable crash.

Mozilla Firefox 117, Mozilla Firefox ESR 115.2.0, Mozilla Thunderbird 115.2 : When calling code JS::CheckRegExpSyntax a Syntax Error could have been set which would end in calling code convertToRuntimeErrorAndClear . A path in the function could attempt to allocate memory when none is available which would have caused a newly created Out of Memory exception to be mishandled as a Syntax Error.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1483

© SecPod Technologies