[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 1954 Download | Alert*

The host is missing a high security update according to Mozilla advisory, MFSA2012-37. The update is required to fix information disclosure vulnerability. A flaw is present in the applications, which fail to handle Windows file shares and shortcut files. Successful exploitation could allow local users to obtain sensitive information via an HTML document.

The host is missing a high security update according to Mozilla advisory, MFSA2012-36. The update is required to fix cross-site scripting vulnerability. A flaw is present in the applications, which fail to handle the Content Security Policy implementation. Successful exploitation could allow remote attackers to conduct cross-site scripting (XSS) attacks.

The host is missing a critical security update according to Mozilla advisory, MFSA2012-34. The update is required to fix memory corruption vulnerability. A flaw is present in the applications, which fail to handle the browser engine. Successful exploitation could allow attackers to run arbitrary code.

The host is missing a critical severity security update according to Mozilla advisory, MFSA2020-04. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation allows remote attackers to crash the service.

The host is missing a critical severity security update according to Mozilla advisory, MFSA2020-03. The update is required to fix type confusion vulnerabilities. The flaws are present in the application, which fails to handle Incorrect alias information in IonMonkey JIT compiler. Successful exploitation can cause unspecified impact.

The host is missing a high severity security update according to Mozilla advisory, MFSA2020-02. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation allows attackers to execute arbitrary code or disclose sensitive information.

The host is missing a high severity security update according to Mozilla advisory, MFSA2020-01. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation allows attackers to execute arbitrary code or disclose sensitive information.

The host is missing a high security update according to Mozilla advisory, MFSA2019-17. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation allows remote attackers to crash the service.

The host is missing a high security update according to Mozilla advisory, MFSA2012-33. The update is required to fix address bar spoofing vulnerability. A flaw is present in the applications, which fail to properly load RSS and Atom feed content. Successful exploitation could allow attackers to spoof the address bar.

The host is missing a critical security update according to Mozilla advisory, MFSA2012-30. The update is required to fix remote code execution vulnerability. A flaw is present in the applications, which fail to handle the texImage2D implementation. Successful exploitation could allow attackers to execute arbitrary code.


Pages:      Start    121    122    123    124    125    126    127    128    129    130    131    132    133    134    ..   195

© SecPod Technologies