[Forgot Password]
Login  Register Subscribe

24003

 
 

131425

 
 

104705

 
 

909

 
 

84100

 
 

133

 
 
Paid content will be excluded from the download.

Filter
Matches : 12107 Download | Alert*

The host is installed with Mozilla Firefox before 42.0 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a crafted web site that sends an NTLM request and reads the Workstation field of an NTLM type 3 message. Successful exploitation could allow attackers to obtain sensitive hostname information by constructing a crafted w ...

The host is installed with Mozilla Firefox before 41.0 and is prone to a spoofing vulnerability. A flaw is present in the application, which fails to properly handle a crafted web site. Successful exploitation could allow attackers to spoof the relationship between address-bar URLs and web content.

The host is installed with Mozilla Firefox before 41.0 and is prone to a race condition vulnerability. A flaw is present in the application, which fails to properly handle improper interaction between shared workers and the IndexedDB implementation. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Mozilla Firefox before 41.0 and is prone to a denial of service.ulnerability. A flaw is present in the application, which fails to properly handle a crafted web site. Successful exploitation could allow attackers to execute or crash the service.

The host is installed with Mozilla Firefox before 41.0 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle crafted attributes in the ICC 4 profile of an image. Successful exploitation could allow attackers to obtain sensitive information or cause a denial of service.

The host is installed with Mozilla Firefox before 41.0 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle array boundaries that were established with a navigator.mozTCPSocket.open method call and send method calls. Successful exploitation could allow attackers to obtain sensitive information from process memory by reading p ...

The host is installed with Mozilla Firefox before 41.0 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle certain receiver arguments. Successful exploitation could allow attackers to bypass intended window access restrictions.

The host is installed with Mozilla Firefox before 41.0 and is prone to multiple unspecified vulnerabilities. The flaws are present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to crash the service.

The host is installed with Mozilla Firefox before 37.0.2 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle a crafted plugin that does not properly complete initialization. Successful exploitation could allow attackers to execute arbitrary code or cause a denial of service (use-after-free).

The host is installed with Mozilla Firefox before 37.0 and is prone to multiple unspecified vulnerabilities. The flaws are present in the application, which fails to handle unknown vectors. Successful exploitation could allow attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code.


Pages:      Start    1120    1121    1122    1123    1124    1125    1126    1127    1128    1129    1130    1131    1132    1133    ..   1210

© 2013 SecPod Technologies