Security issues were identified and fixed in firefox 3.5.x: Security researcher Alin Rad Pop of Secunia Research reported a heap-based buffer overflow in Mozilla"s string to floating point number conversion routines. Using this vulnerability an attacker could craft some malicious JavaScript code containing a very long string to be converted to a floating point number which would result in improper ...
The host is installed with Apache HTTP Server 2.2.x before 2.2.16 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a request that lacks path. Successful exploitation could allow attackers to crash the service.
Security issues were identified and fixed in firefox 3.0.x: Security researcher Alin Rad Pop of Secunia Research reported a heap-based buffer overflow in Mozilla"s string to floating point number conversion routines. Using this vulnerability an attacker could craft some malicious JavaScript code containing a very long string to be converted to a floating point number which would result in improper ...
Security issues were identified and fixed in firefox 3.0.x: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, SeaMonkey before 2.0.1, and Thunderbird allow remote attackers to cause a denial of service or possibly execute arbitrary code via unknown vectors . Multiple unspecified vulnerabilities in the browser engine in Mozilla Fire ...
Th host is installed with Apache HTTP Server 2.2.9 through 2.2.15, 2.3.4-alpha, and 2.3.5-alpha on OS/2 and is prone to a denial of service vulnerability. A flaw is present in certain configurations involving proxy worker pools, which does not properly detect timeouts, which allows remote attackers to obtain a potentially sensitive response intended for a different client in opportunistic circumst ...
Security issues were identified and fixed in firefox 3.5.x: liboggplay in Mozilla Firefox 3.5.x before 3.5.6 and SeaMonkey before 2.0.1 might allow context-dependent attackers to cause a denial of service or execute arbitrary code via unspecified vectors, related to memory safety issues. Integer overflow in libtheora in Xiph.Org Theora before 1.1, as used in Mozilla Firefox 3.5 before 3.5.6 and ...
Security issues were identified and fixed in firefox 3.0.x: Security researcher Alin Rad Pop of Secunia Research reported a heap-based buffer overflow in Mozilla"s string to floating point number conversion routines. Using this vulnerability an attacker could craft some malicious JavaScript code containing a very long string to be converted to a floating point number which would result in improper ...
The host is installed with Mac OS X 10.6 through 10.6.6 and is prone to multiple format string vulnerabilities. A flaw is present in the application, which fails to handle format string specifiers. Successful exploitation could allow attackers to crash the service.
The host is installed with Apple Mac OS X 10.6.0 through 10.6.6 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application which fails to handle open type fonts. Successful exploitation could allow attackers to execute arbitrary code.
The host is installed with Apple Mac OS X and is prone to multiple buffer overflow vulnerabilities. The flaws are present in the application, which fails to handle a document that contains a crafted embedded TrueType font. Successful exploitation could allow attackers to cause multiple buffer overflows.