[Forgot Password]
Login  Register Subscribe

26408

 
 

132812

 
 

151352

 
 

909

 
 

120842

 
 

163

 
 
Paid content will be excluded from the download.

Filter
Matches : 54 Download | Alert*

The host is installed with Google Chrome before 45.0.2454.85 and is prone to a double free vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow remote attackers to execute arbitrary code or crash the service.

Mozilla Firefox 74, Mozilla Firefox ESR 68.6 and Mozilla Thunderbird 68.6 : The first time AirPods are connected to an iPhone, they become named after the user's name by default (e.g. Jane Doe's AirPods.) Websites with camera or microphone permission are able to enumerate device names, disclosing the user's name. To resolve this issue, Firefox added a special case that renames devices containing ...

The host is installed with Adobe Flash Player before 18.0.0.261, 19.x before 19.0.0.245 or Adobe AIR before 19.0.0.241 and is prone to an use-after-free vulnerability. A flaw is present in the applications, which fail to properly handle crafted DefineFunction atoms. Successful exploitation could allow attackers to execute arbitrary code.

Mozilla Firefox 69, Mozilla Firefox ESR 68.1 : If a Content Security Policy (CSP) directive is defined that uses a hash-based source that takes the empty string as input, execution of any <code>javascript:</code> URIs will be allowed. This could allow for malicious JavaScript content to be run, bypassing CSP permissions.

The host is installed with Jenkins LTS through 2.89.1 or Jenkins rolling release through 2.81 and is prone to a race condition vulnerability. A flaw is present in the application, which fails to properly handle a startup issue. Successful exploitation could allow attackers to cause a failure to initialize the setup wizard on the first startup resulting in multiple security-related settings not bei ...

The host is installed with Apple Safari before 4.1 or 5.0 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a crafted port number. Successful exploitation could allow attackers to bypass security restrictions.

The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.4 and is prone to a network sniffing attack vulnerability. A flaw is present in the application, which fails to properly restrict the length of RSA keys within X.509 certificates. Successful exploitation could allow attackers to defeat cryptographic protection mechanisms by conducting a spoofing or network-sniffing attack durin ...

Mozilla Firefox 70, Mozilla Firefox ESR 68.2 and Mozilla Thunderbird 68.2: By using a form with a data URI it was possible to gain access to the privileged codeJSONView/code object that had been cloned into content. Impact from exposing this object appears to be minimal, however it was a bypass of existing defense in depth mechanisms.

The host is installed with LibreOffice 6.2.x before 6.2.7 or 6.3.x before 6.3.1 and is prone to a directory traversal vulnerability. A flaw is present in the application, which fails to properly handle an unknown functionality of the file share/Scripts/python of the component URL Encoding. Successful exploitation could allow attackers to execute scripts in arbitrary locations on the file system by ...

The host is installed with LibreOffice 6.4.x before 6.4.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle remote graphic links loaded from docx documents were not in stealth mode by default. Successful exploitation could leak sensitive data.


Pages:      Start    1    2    3    4    5    ..   5

© SecPod Technologies