[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 17560 Download | Alert*

he host is installed with Mozilla Firefox before 7.0 or SeaMonkey before 2.4 and is prone to a security bypass vulnerability. A flaw is present in the applications, which fail to prevent access to motion data events. Successful exploitation could allow remote attackers to read keystrokes by leveraging JavaScript code running in a background tab.

The host is installed with Mozilla Firefox before 41.0 and is prone to a denial of service.ulnerability. A flaw is present in the application, which fails to properly handle a crafted web site. Successful exploitation could allow attackers to execute or crash the service.

The host is installed with Mozilla Firefox before 41.0 and is prone to a spoofing vulnerability. A flaw is present in the application, which fails to properly handle a crafted web site. Successful exploitation could allow attackers to spoof the relationship between address-bar URLs and web content.

The host is installed with Mozilla Firefox before 41.0 and is prone to an ECMAScript 5 (aka ES5) API protection mechanism bypass vulnerability. A flaw is present in the application, which fails to properly handle a crafted web page that does not use ES5 APIs. Successful exploitation could allow attackers to bypass certain ECMAScript 5 (aka ES5) API protection mechanisms and modify immutable proper ...

The host is installed with Mozilla Firefox before 41.0 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle crafted JavaScript code that makes performance.now calls. Successful exploitation could allow attackers to track last-level cache access, and consequently obtain sensitive information.

The host is installed with Mozilla Firefox before 40.0 and is prone to an use after free vulnerability. A flaw is present in the application, which fails to properly handle the Web Audio API. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Mozilla Firefox before 40.0 and is prone to a mixed-content protection mechanism bypass vulnerability. A flaw is present in the application, which fails to properly handle a feed: URL in a POST request. Successful exploitation could allow attackers to bypass a mixed-content protection mechanism.

The host is installed with Mozilla Firefox before 40.0 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly implement the Content Security Policy Level 2 exceptions for the blob, data, and filesystem URL schemes during wildcard source-expression matching. Successful exploitation could allow attackers to conduct cross-site scripting (XS ...

The host is installed with Mozilla Firefox before 38.0 and is prone to multiple integer overflow vulnerabilities. The flaws are present in the application, which fails to properly handle crafted sample metadata. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Mozilla Firefox before 39.0 and is prone to an information disclosure vulnerability. A flaw is present in the applications, which include native key press information during the logging of crashes. Successful exploitation could allow attackers to obtain sensitive information.


Pages:      Start    1106    1107    1108    1109    1110    1111    1112    1113    1114    1115    1116    1117    1118    1119    ..   1755

© SecPod Technologies