[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

111666

 
 

909

 
 

87321

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 9092 Download | Alert*

Mozilla Firefox before 59.0 : WebExtensions may use view-source: URLs to view local file: URL content, as well as content stored in about:cache, bypassing restrictions that only allow WebExtensions to view specific content.

Mozilla Firefox before 59.0 : WebExtensions can bypass normal restrictions in some circumstances and use browser.tabs.executeScript to inject scripts into contexts where this should not be allowed, such as pages from other WebExtensions or unprivileged about: pages.

Mozilla Firefox before 53.0, Thunderbird before 52.1, Firefox ESR before 45.9 or 52.x before 52.1 :- A flaw in DRBG number generation within the Network Security Services (NSS) library where the internal state V does not correctly carry bits over.

The host is installed with Apple Mac OS X or Server 10.7 through 10.7.5, 10.8 through 10.8.5 or 10.9 through 10.9.5 and is prone to arbitrary code execution vulnerability. A flaw is present in the Bash's parsing of environment variables, which fails to properly handle a crafted environment. Successful exploitation allows attackers to write to files or possibly have unknown other impact.

The host is installed with Apple Mac OS X or Server before 10.10 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted environment. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or before 10.10.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle crafted content. Successful exploitation allow attackers to execute arbitrary code.

The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or before 10.10.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle crafted content. Successful exploitation allow attackers to execute arbitrary code.

The host is installed with Apple Mac OS X or Server 10.7 through 10.7.5, 10.8 through 10.8.5 or 10.9 through 10.9.5 and is prone to arbitrary code execution vulnerability. A flaw is present in the Bash's parsing of environment variables, which fails to properly handle a crafted environment. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Apple Mac OS X or Server before 10.10 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted environment. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or before 10.10.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle crafted content. Successful exploitation allows attackers to execute arbitrary code.


Pages:      Start    3    4    5    6    7    8    9    10    11    12    13    14    15    16    ..   909

© SecPod Technologies