[Forgot Password]
Login  Register Subscribe

24003

 
 

131573

 
 

108741

 
 

909

 
 

85475

 
 

134

 
 
Paid content will be excluded from the download.

Filter
Matches : 12337 Download | Alert*

The host is installed with Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8 or SeaMonkey before 2.13 and is prone to multiple unspecified vulnerabilities. The flaws are present in the applications, which fail to properly handle vectors related to memory. Successful exploitation could allow attackers to cause a denial of servic ...

The host is installed with Mozilla Firefox before 16.0, Thunderbird before 16.0 or SeaMonkey before 2.13 and is prone to multiple unspecified vulnerabilities. The flaws are present in the applications, which fail to properly handle vectors related to memory. Successful exploitation could allow attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbi ...

The host is installed with Mozilla Firefox before 16.0, Thunderbird before 16.0 or SeaMonkey before 2.13 and is prone to spoofing vulnerability. A flaw is present in the applications, which fail to properly handle navigation away from a web page that has a SELECT element's menu active. Successful exploitation could allow attackers to spoof page content.

The host is installed with Mozilla Firefox before 16.0, Thunderbird before 16.0 or SeaMonkey before 2.13 and is prone to click-jacking attack vulnerability. A flaw is present in the applications, which fail to properly handle navigation away from a web page that has multiple menus of SELECT elements active. Successful exploitation could allow attackers to conduct click-jacking attacks.

The host is installed with IrfanView before 4.32 and is prone to heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted "Rows Per Strip" and "Samples Per Pixel" values in a TIFF image file. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Google Chrome before 4.0.249.78 and is prone to information disclosure vulnerability. A flaw is present in the application which does not perform the expected encoding, escaping, and quoting for the URL in the --app argument in a desktop shortcut. Successful exploitation allow user-assisted remote attackers to execute arbitrary programs or obtain sensitive information by ...

The host is installed with Oracle Java SE 7 Update 7 or earlier, 6 Update 35 or earlier, 5.0 Update 36 or earlier or 1.4.2_38 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to networking. Successful exploitation allows remote attackers to affect confidentiality.

The host is installed with Oracle Java SE 7 Update 7 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to libraries. Successful exploitation allows attackers to affect confidentiality.

The host is installed with Oracle Java SE JavaFX 2.2 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle JavaFX component. Successful exploitation allows attackers to affect availability.

The host is installed with Oracle Java SE JavaFX 2.2 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle JavaFX component. Successful exploitation allows attackers to affect availability.


Pages:      Start    1148    1149    1150    1151    1152    1153    1154    1155    1156    1157    1158    1159    1160    1161    ..   1233

© SecPod Technologies