[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 17058 Download | Alert*

The host is installed with Mozilla Firefox before 41.0 and is prone to a spoofing vulnerability. A flaw is present in the application, which fails to properly handle a crafted web site. Successful exploitation could allow attackers to spoof the relationship between address-bar URLs and web content.

The host is installed with Mozilla Firefox before 41.0 and is prone to an ECMAScript 5 (aka ES5) API protection mechanism bypass vulnerability. A flaw is present in the application, which fails to properly handle a crafted web page that does not use ES5 APIs. Successful exploitation could allow attackers to bypass certain ECMAScript 5 (aka ES5) API protection mechanisms and modify immutable proper ...

The host is installed with Mozilla Firefox before 41.0 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle crafted JavaScript code that makes performance.now calls. Successful exploitation could allow attackers to track last-level cache access, and consequently obtain sensitive information.

The host is installed with Mozilla Firefox before 40.0 and is prone to an use after free vulnerability. A flaw is present in the application, which fails to properly handle the Web Audio API. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Mozilla Firefox before 40.0 and is prone to a mixed-content protection mechanism bypass vulnerability. A flaw is present in the application, which fails to properly handle a feed: URL in a POST request. Successful exploitation could allow attackers to bypass a mixed-content protection mechanism.

The host is installed with Mozilla Firefox before 40.0 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly implement the Content Security Policy Level 2 exceptions for the blob, data, and filesystem URL schemes during wildcard source-expression matching. Successful exploitation could allow attackers to conduct cross-site scripting (XS ...

The host is installed with Mozilla Firefox before 38.0 and is prone to multiple integer overflow vulnerabilities. The flaws are present in the application, which fails to properly handle crafted sample metadata. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Mozilla Firefox before 39.0 and is prone to an information disclosure vulnerability. A flaw is present in the applications, which include native key press information during the logging of crashes. Successful exploitation could allow attackers to obtain sensitive information.

The host is installed with Mozilla Firefox before 39.0 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to handle unknown vectors. Successful exploitation could allow attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code.

The host is installed with Mozilla Firefox before 38.0 and is prone to multiple unspecified vulnerabilities. The flaws are present in the application, which fails to handle unknown vectors. Successful exploitation could allow attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code.


Pages:      Start    946    947    948    949    950    951    952    953    954    955    956    957    958    959    ..   1705

© SecPod Technologies