[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 7346 Download | Alert*

The host is installed with Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11 or SeaMonkey before 2.14 and is prone to cross-site scripting (XSS) vulnerability. A flaw is present in the applications, which does not properly restrict write actions. Successful exploitation allows remote attackers to conduct cross-site scripting ...

The host is installed with Mozilla Firefox and is prone to denial of service vulnerability. A flaw is present in the browser, which fails to handle JavaScript code that creates arrays containing elements with overly long strings and appends the strings to P element content. Successful exploitation could allow remote attackers to cause denial of service.

The host is installed with Mozilla Firefox or SeaMonkey and is prone to denial of service vulnerability. A flaw is present in the browsers, which fails to handle IFRAME element having a mailto: URL in its SRC attribute. Successful exploitation could allow remote attackers to execute arbitrary code and cause a denial of service.

The host is installed with Mozilla Firefox and is prone to denial of service vulnerability. A flaw is present in the browser, which fails to handle malicious compressed data. Successful exploitation could allow remote attackers to execute arbitrary code and cause a denial of service.

The host is installed with Mozilla Firefox and is prone to information disclosure vulnerability. A flaw is present in the browser, which displays the final URL in case of a redirection in the HREF attribute of a stylesheet LINK element. Successful exploitation could allow remote attackers to obtain the redirected URL.

The host is installed with Mozilla Firefox or Thunderbird or SeaMonkey and is prone to remote code execution vulnerability. A flaw is present in the nsIScriptableUnescapeHTML.parseFragment method, which fails to sanitize HTML in a chrome document. Successful exploitation could allow remote attackers to execute arbitrary javascript through the HREF attribute of an A element or the ACTION attribute ...

The host is installed with Mozilla Firefox or SeaMonkey and is prone to privilege escalation vulnerability. A flaw is present in the browsers, which fails to handle the injection of an ISINDEX element into an about:blank page which upon submission would redirect to a chrome: document. Successful exploitation could allow remote attackers to execute arbitrary code with chrome privileges.

The host is installed with Mozilla Firefox and is prone to denial of service vulnerability. A flaw is present in the WebSockets implementation, which fails to handle proxy upgrade negotiation. Successful exploitation could allow remote attackers to execute arbitrary code and cause denial of service.

The host is installed with Mozilla Firefox or SeaMonkey and is prone to use after free vulnerability. A flaw is present in the nsCycleCollector::MarkRoots function, which fails to handle frame construction process for menus. Successful exploitation could allow remote attackers to execute arbitrary code.

The host is installed with Mozilla Firefox before 16.0.2, Firefox ESR 10.x before 10.0.10, Thunderbird before 16.0.2, Thunderbird ESR 10.x before 10.0.10 or SeaMonkey before 2.13.2 and is prone to cross-site scripting (XSS) vulnerabilities. The flaws are present in the applications, which fail to prevent use of the valueOf method to shadow the location object (aka window.location). Successful expl ...


Pages:      Start    10    11    12    13    14    15    16    17    18    19    20    21    22    23    ..   734

© SecPod Technologies