[Forgot Password]
Login  Register Subscribe

25354

 
 

132805

 
 

136938

 
 

909

 
 

113195

 
 

156

 
 
Paid content will be excluded from the download.

Filter
Matches : 7302 Download | Alert*

The host is installed with Wireshark 2.6.0 to 2.6.5 or 2.4.0 to 2.4.11 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle issues in epan/charsets.c file. Successful exploitation allows attackers to crash the RTSE dissector.

The host is installed with python before versions 2.7.15 or 3.4.9 and is prone to a denial-of-service vulnerability. The flaw is present in the application, which fails to properly handle catastrophic backtracking in pop3lib's apop() method. Successful exploitation allow context-dependent attackers to cause denial-of-service.

The host is installed with Mozilla Firefox before 44.0, Firefox ESR 38.x before 38.6 or Mozilla Thunderbird 38.x before 38.6 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle crafted data. Successful exploitation allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary c ...

The host is installed with Mozilla Firefox before 44.0, Firefox ESR 38.x before 38.6 or Mozilla Thunderbird before 38.6 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle crafted data. Successful exploitation allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code.

The host is installed with Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13 or SeaMonkey before 2.0.11 and is prone to use-after-free vulnerability. A flaw is present in nsDOMAttribute node handling. Successful exploitation allows remote attackers to execute arbitrary code by making the iterator of DOM traversal to point to an attacker controlled memory location.

The host is installed with Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13 or SeaMonkey before 2.0.11 and is prone to integer overflow vulnerability. A flaw is present in the NewIdArray function, which allows construction of an array containing a very large number of items causing an overflow of integer value that stores the buffer size. Successful exploitation could let remote attackers to ...

The host is installed with Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, Mozilla Thunderbird before 3.0.11 and 3.1.x before 3.1.7, or Mozilla SeaMonkey before 2.0.11 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to validate downloadable fonts before use within an operating system's font implementation. Successful exploitation could ...

The host is installed with Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13 or Mozilla SeaMonkey before 2.0.11 and is prone to multiple cross-site scripting (XSS) vulnerabilities. The flaws are present in the rendering engine, which are caused due to some characters being converted to angle brackets when displayed by the engine. Successful exploitation could allow remote attackers to inject a ...

The host is installed with Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13 or Mozilla SeaMonkey before 2.0.11 and is prone to privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle injection of an ISINDEX element into an about:blank page which upon submission would redirect to a chrome: document. Successful exploitation could allow remote att ...

The host is installed with Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13 or Mozilla SeaMonkey before 2.0.11 and is prone to remote code execution vulnerability. A flaw is present in the <div> element handling, which incorrectly treats the <div> element inside a <treechildren> element as a parent node to tree content underneath it, when the code attempts to display content in the XUL tree. ...


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   730

© SecPod Technologies