[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15792 Download | Alert*

The host is installed with Mozilla Firefox before 44.0 and is prone to a clickjacking attack vulnerability. A flaw is present in the application, which fails to properly handle delay between the download dialog getting focus and the button getting enabled was too short. Successful exploitation could lead unintentional actions such as the running of downloaded software.

The host is installed with Mozilla Firefox 43.x and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle the absence of reputation data. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Mozilla Firefox before 44.0 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to properly handle a malicious MP4 format video file. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Mozilla Firefox before 44.0 and is prone to a wild pointer flaw vulnerability. A flaw is present in the application, which fails to properly handle crafted zip files. Successful exploitation allows remote attackers to crash the service.

The host is installed with Mozilla Firefox before 44.0 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation allows remote attackers to corrupt memory.

The host is installed with Mozilla Firefox before 44.0 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a URL when internal protocol is pasted into the addressbar. Successful exploitation allows remote attackers to manipulate the address bar contents to show location.

The host is installed with Mozilla Firefox before 44.0 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle the altered cookie. Successful exploitation allows remote attackers to bypass security restrictions.

The host is installed with Mozilla Firefox before 44.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted web. Successful exploitation allows remote attackers to conduct clickjacking attacks.

The host is installed with Mozilla Firefox before 44.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted image file. Successful exploitation allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code.

The host is installed with Mozilla Firefox before 42.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an NSAccessibilityIndexAttribute value to reference a row index. Successful exploitation could allow attackers to execute arbitrary code or crash the service.


Pages:      Start    837    838    839    840    841    842    843    844    845    846    847    848    849    850    ..   1579

© SecPod Technologies