This CPE summary could be partial or incomplete. Please contact us for a detailed listing.
Summary
Detail | |||
---|---|---|---|
Vendor | Opentype Sanitiser Project | First view | 2015-02-25 |
Product | Opentype Sanitiser | Last view | 2015-02-25 |
Version | * | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:opentype_sanitiser_project:opentype_sanitiser |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
7.5 | 2015-02-25 | CVE-2015-0823 | Multiple use-after-free vulnerabilities in OpenType Sanitiser, as used in Mozilla Firefox before 36.0, might allow remote attackers to trigger problematic Developer Console information or possibly have unspecified other impact by leveraging incorrect macro expansion, related to the ots::ots_gasp_parse function. |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2015-03-02 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_990291728253407d9d8b2cfeab9abf81.nasl - Type: ACT_GATHER_INFO |
2015-02-25 | Name: The remote Mac OS X host contains a web browser that is affected by multiple ... File: macosx_firefox_36.nasl - Type: ACT_GATHER_INFO |
2015-02-25 | Name: The remote Windows host contains a web browser that is affected by multiple v... File: mozilla_firefox_36_0.nasl - Type: ACT_GATHER_INFO |