[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 1792 Download | Alert*

The host is missing a critical security update according to Mozilla advisory, MFSA2012-34. The update is required to fix memory corruption vulnerability. A flaw is present in the applications, which fail to handle the browser engine. Successful exploitation could allow attackers to run arbitrary code.

The host is missing a critical severity security update according to Mozilla advisory, MFSA2020-04. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation allows remote attackers to crash the service.

The host is missing a critical severity security update according to Mozilla advisory, MFSA2020-03. The update is required to fix type confusion vulnerabilities. The flaws are present in the application, which fails to handle Incorrect alias information in IonMonkey JIT compiler. Successful exploitation can cause unspecified impact.

The host is missing a high severity security update according to Mozilla advisory, MFSA2020-02. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation allows attackers to execute arbitrary code or disclose sensitive information.

The host is missing a high severity security update according to Mozilla advisory, MFSA2020-01. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation allows attackers to execute arbitrary code or disclose sensitive information.

The host is missing a high security update according to Mozilla advisory, MFSA2019-17. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation allows remote attackers to crash the service.

The host is missing a high security update according to Mozilla advisory, MFSA2012-33. The update is required to fix address bar spoofing vulnerability. A flaw is present in the applications, which fail to properly load RSS and Atom feed content. Successful exploitation could allow attackers to spoof the address bar.

The host is missing a critical security update according to Mozilla advisory, MFSA2012-30. The update is required to fix remote code execution vulnerability. A flaw is present in the applications, which fail to handle the texImage2D implementation. Successful exploitation could allow attackers to execute arbitrary code.

The host is missing a moderate security update according to Mozilla advisory, MFSA2012-29. The update is required to fix multiple cross-site scripting vulnerabilities. The flaws are present in the applications, which fail to handle the decoding of ISO-2022-KR and ISO-2022-CN character sets. Successful exploitation could allow attackers to inject arbitrary web script or HTML.

The host is missing a critical security update according to Mozilla advisory, MFSA2012-28. The update is required to fix origin bypass vulnerability. A flaw is present in the applications, which fail to properly construct the Origin and Sec-WebSocket-Origin HTTP headers. Successful exploitation could allow attackers to bypass an IPv6 literal ACL via a cross-site XMLHttpRequest or WebSocket operati ...


Pages:      Start    111    112    113    114    115    116    117    118    119    120    121    122    123    124    ..   179

© SecPod Technologies