[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 17058 Download | Alert*

The host is installed with Mozilla Firefox before 3.6.18 or Thunderbird before 3.1.11 and is prone to use-after-free vulnerability. A flaw is present in the applications which fails to properly handle user-supplied callback. Successful exploitation allows remote attacker to execute arbitrary code and cause a denial of service.

The host is installed with Mozilla Firefox 3.6.18 or before 5.0 or Thunderbird before 3.1.11 and is prone to unspecified vulnerability. A flaw is present in the applications which fails to properly handle memory. Successful exploitation allows remote attacker to execute arbitrary code.

The host is installed with Mozilla Firefox 3.6.x before 3.6.18 or Thunderbird before 3.1.11 or and is prone to unspecified vulnerability. A flaw is present in the applications which fails to properly handle memory. Successful exploitation allows remote attacker to execute arbitrary code.

The host is installed with Mozilla Firefox 4.x through 4.0.1 and is prone to information-disclosure vulnerability. A flaw is present in the application which fails to properly restrict read operations. Successful exploitation allows remote attacker to cause a denial of service (application crash).

The host is installed with Mozilla Firefox 4.x through 4.0.1 and is prone to remote code-execution vulnerability. A flaw is present in the application which fails to properly restrict write operations. Successful exploitation allows remote attacker to cause a denial of service (application crash).

The host is installed with Mozilla Firefox 4.x through 4.0.1 and is prone to cross-site scripting (XSS) vulnerability. A flaw is present in the application which is caused by improper validation of user-supplied input. Successful exploitation allows remote attacker to inject arbitrary web script.

The host is installed with Mozilla Firefox before 5.0 and is prone to security-bypass vulnerability. A flaw is present in the application which is caused by an error related to a non-whitelisted site triggering an install dialog for add-ons and themes. Successful exploitation allows remote attacker to execute arbitrary code.

The host is installed with Mozilla Firefox before 3.6.18 or 4.x through 4.0.1 or Thunderbird before 3.1.11 or Seamonkey before 2.2 and is prone to integer overflow vulnerability. A flaw is present in the applications which fails to validate the length of a JavaScript Array object. Successful exploitation allows remote attacker to execute arbitrary code.

The host is installed with Mozilla Firefox before 3.6.18 or 4.x through 4.0.1 or Thunderbird before 3.1.11 or Seamonkey before 2.2 and is prone to use-after-free vulnerability. A flaw is present in the applications which fails to properly handle memory when JavaScript is disabled. Successful exploitation allows remote attacker to execute arbitrary code.

The host is installed with Mozilla Firefox before 3.6.18 or 4.x through 4.0.1 or Thunderbird before 3.1.11 or Seamonkey before 2.2 and is prone to multiple unspecified vulnerabilities. The flaws are present in the applications which fail to properly handle memory. Successful exploitation allows remote attacker to execute arbitrary code and cause a denial of service.


Pages:      Start    951    952    953    954    955    956    957    958    959    960    961    962    963    964    ..   1705

© SecPod Technologies