[Forgot Password]
Login  Register Subscribe

24128

 
 

131573

 
 

110204

 
 

909

 
 

85984

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 778 Download | Alert*

The host is installed with Mozilla Firefox before 15.0, Thunderbird before 15.0, and SeaMonkey before 2.12 and is prone to an information disclosure vulnerability. A flaw is present in the applications, which fail to handle crafted data in privileged extension code. Successful exploitation could allow attackers to obtain sensitive information.

The host is missing a security update according to Mozilla advisory, MFSA 2012-67. The update is required to fix an untrusted search path vulnerability. A flaw is present in the applications, which fail to properly handle a Trojan horse executable. Successful exploitation could allow local users to gain privileges.

The host is missing a security update according to mozilla advisory, MFSA 2012-66. The update is required to fix an arbitrary code execution vulnerability. A flaw is present in the application, which fails to restrict access to the remote-debugging service. Successful exploitation could allow attackers to execute arbitrary code.

The host is missing a security update according to Mozilla advisory, MFSA 2012-65. The update is required to fix an out-of-bounds read vulnerability. A flaw is present in the applications, which fail to properly implement XSLT implementation. Successful exploitation could allow attackers to obtain sensitive information.

The host is installed with Mozilla Firefox before 15.0, Thunderbird before 15.0, and SeaMonkey before 2.12 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle vectors related to the (1) Silf::readClassMap and (2) Pass::readPass functions. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is missing a security update according to Mozilla advisory, MFSA 2012-63. The update is required to fix multiple vulnerabilities. The flaws are present in the applications, which fail to handle crafted inputs. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is missing a security update according to Mozilla advisory, MFSA 2012-62. The update is required to fix a use-after-free vulnerability. A flaw is present in the applications, which fail to handle vectors related to deletion of a fragment. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is missing a security update according to Mozilla advisory, MFSA 2012-61. The update is required to fix a memory corruption vulnerability. A flaw is present in the applications, which fail to handle a negative height value in a BMP image within a .ICO file. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is missing a security update according to Mozilla advisory, MFSA 2012-60. The update is required to fix a privilege escalation vulnerability. A flaw is present in the applications, which fail to properly restrict navigation to the about:newtab page. Successful exploitation could allow remote attackers to execute arbitrary JavaScript code with chrome privileges.

The host is missing a security update according to Mozilla advisory, MFSA 2012-57. The update is required to fix multiple use-after-free vulnerabilities. The flaws are present in the applications, which fail to handle unknown vectors. Successful exploitation could allow attackers to execute arbitrary code or crash the service.


Pages:      Start    65    66    67    68    69    70    71    72    73    74    75    76    77    ..   77

© SecPod Technologies