[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 195419 Download | Alert*

The host is installed with Mozilla Firefox before 43.0 or Firefox ESR 38.x before 38.6.1 and is prone to an information disclosure vulnerability. A flaw is present in the applications, which fail to handle a crafted graphite smart font. Successful exploitation allows remote attackers to obtain sensitive information or cause a denial of service (out-of-bounds read and application crash).

The host is missing a critical security update according to Mozilla advisory, MFSA2016-08. The update is required to fix a clickjacking attack vulnerability. A flaw is present in the application, which fails to properly handle delay between the download dialog getting focus and the button getting enabled was too short. Successful exploitation could lead unintentional actions such as the running of ...

The host is installed with Mozilla Firefox before 44.0 and is prone to a clickjacking attack vulnerability. A flaw is present in the application, which fails to properly handle delay between the download dialog getting focus and the button getting enabled was too short. Successful exploitation could lead unintentional actions such as the running of downloaded software.

The host is missing a critical security update according to Mozilla advisory, MFSA2016-11. The update is required to fix a security bypass vulnerability. A flaw is present in the application, which fails to properly handle the absence of reputation data. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Mozilla Firefox 43.x and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle the absence of reputation data. Successful exploitation allows remote attackers to execute arbitrary code.

The host is missing a critical security update according to Mozilla advisory, MFSA2016-10. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Mozilla Firefox before 44.0 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to properly handle a malicious MP4 format video file. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Mozilla Firefox before 44.0 and is prone to a wild pointer flaw vulnerability. A flaw is present in the application, which fails to properly handle crafted zip files. Successful exploitation allows remote attackers to crash the service.

The host is installed with Mozilla Firefox before 44.0 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation allows remote attackers to corrupt memory.

The host is missing an important security update according to Mozilla advisory, MFSA2016-09. The update is required to fix a security bypass vulnerability. A flaw is present in the application, which fails to handle a URL which is invalid for an internal protocol is pasted into the addressbar. Successful exploitation allows remote attackers to manipulate the address bar contents to show location.


Pages:      Start    8824    8825    8826    8827    8828    8829    8830    8831    8832    8833    8834    8835    8836    8837    ..   19541

© SecPod Technologies