[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253650

 
 

909

 
 

197367

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 196482 Download | Alert*

The host is missing a critical security update according to Mozilla advisory, MFSA2012-56. The update is required to fix an arbitrary code execution vulnerability. A flaw is present in the applications, which fail to handle a crafted javascript: URL. Successful exploitation could allow attackers to execute arbitrary code.

The host is missing a high severity security update according to Mozilla advisory, MFSA2020-29. The update is required to fix an multiple vulnerabilities. The flaws are present in the application, which fails to handle an unknown vector. Successful exploitation can cause unspecified impact.

The host is installed with Mozilla Firefox before 78.0.2 and is prone to an X-Frame-Options bypass vulnerability. The flaws are present in the application, which fails to handle an unknown vector. Successful exploitation can cause unspecified impact.

The host is missing a moderate severity security update according to Mozilla advisory, MFSA2020-28. The update is required to fix an X-Frame-Options bypass vulnerability. The flaws are present in the application, which fails to handle an unknown vector. Successful exploitation can cause unspecified impact.

The host is missing a high severity security update according to Mozilla advisory, MFSA2020-26. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation allows remote attackers to crash the service.

Mozilla Firefox 78 : Mozilla developers and community members Bob Clary, Benjamin Bouvier, Calixte Denizet, Christian Holler reported memory safety bugs present in Firefox 77. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

Mozilla Firefox 78 : Due to confusion processing a hyphen character in Date.parse(), a one-byte out of bounds read could have occurred, leading to potential information disclosure.

Mozilla Firefox 78 : When constructing a permission prompt for WebRTC, a URI was supplied from the content process. This URI was untrusted, and could have been the URI of an origin that was previously granted permission; bypassing the prompt.

Mozilla Firefox 78 : When the Windows DLL "webauthn.dll" was missing from the Operating System, and a malicious one was placed in a folder in the user's %PATH%, Firefox may have loaded the DLL, leading to arbitrary code execution.

Mozilla Firefox 78 : In non-standard configurations, a JPEG image created by JavaScript could have caused an internal variable to overflow, resulting in an out of bounds write, memory corruption, and a potentially exploitable crash.


Pages:      Start    9004    9005    9006    9007    9008    9009    9010    9011    9012    9013    9014    9015    9016    9017    ..   19648

© SecPod Technologies