[Forgot Password]
Login  Register Subscribe

24128

 
 

131573

 
 

110139

 
 

909

 
 

85964

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 11405 Download | Alert*

The host is installed with Mozilla Firefox 4.x through 8.0 or Thunderbird 5.0 through 8.0 or SeaMonkey before 2.6 and is prone to use-after-free vulnerability. A flaw is present in the applications, which fail to handle nsHTMLSelectElement when the parent node of the element is no longer active. Successful exploitation could allow attackers to run arbitrary code.

The host is installed with Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, or SeaMonkey before 2.10 and is prone to heap-based buffer overflow vulnerability. A flaw is present in the applications, which fail to handle vectors related to a character-set conversion. Successful exploitation could allow attackers to ex ...

The host is installed with Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, or SeaMonkey before 2.10 and is prone to heap-based buffer overflow vulnerability. A flaw is present in the applications, which fail to handle nsHTMLReflowState::CalculateHypotheticalBox function. Successful exploitation could allow attacker ...

The host is installed with Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, or SeaMonkey before 2.10 and is prone to use-after-free vulnerability. A flaw is present in the applications, which fail to handle nsFrameList::FirstChild function. Successful exploitation could allow attackers to cause a denial of service o ...

The host is installed with Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, or SeaMonkey before 2.10 and is prone to denial of service vulnerability. A flaw is present in the applications, which fail to handle the ASN.1 decoder in the QuickDER decoder in Mozilla Network Security Services. Successful exploitation cou ...

The host is installed with Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, or SeaMonkey before 2.10 and is prone to use-after-free vulnerability. A flaw is present in the applications, which fail to properly document changes involving replacement or insertion of a node. Successful exploitation could allow remote at ...

The host is installed with Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, or SeaMonkey before 2.10 and is prone to information disclosure vulnerability. A flaw is present in the applications, which fail to handle Windows file shares and shortcut files. Successful exploitation could allow local users to obtain sens ...

The host is installed with Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, or SeaMonkey before 2.10 and is prone to cross-site scripting vulnerability. A flaw is present in the applications, which fail to handle the Content Security Policy implementation. Successful exploitation could allow remote attackers to cond ...

The host is installed with Mozilla Firefox 12.0, Thunderbird 12.0, or SeaMonkey 2.9 and is prone to untrusted search path vulnerability. A flaw is present in the applications, which fail to handle Updater.exe in the Windows Updater Service. Successful exploitation could allow local users to gain privileges via a trojan horse wsock32.dll file.

The host is installed with Mozilla Firefox 12.0, Thunderbird 12.0, or SeaMonkey 2.9 and is prone to privilege escalation vulnerability. A flaw is present in the applications, which fail to handle the Mozilla Updater and Windows Updater Services. Successful exploitation could allow local users to gain privileges by loading a DLL file in a privileged context.


Pages:      Start    1031    1032    1033    1034    1035    1036    1037    1038    1039    1040    1041    1042    1043    1044    ..   1140

© SecPod Technologies