[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 7346 Download | Alert*

The host is installed with Mozilla Firefox before 43.0, Firefox ESR 38.x before 38.5 or Thunderbird 38.x before 38.5 and is prone to multiple unspecified vulnerabilities. The flaws are present in the application, which fails to handle unknown vectors. Successful exploitation allows remote attackers to cause a denial of service (memory corruption and application crash).

The host is installed with Mozilla Firefox before 43.0 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted font-family name. Successful exploitation allows remote attackers to cause a denial of service or possibly have unspecified other impact.

The host is installed with Mozilla Firefox from 41 and before 43.0 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle crafted javascript variable assignments. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Mozilla Firefox before 43.0, Firefox ESR 38.x before 38.5 or Thunderbird 38.x before 38.5 and is prone to an information disclosure vulnerability. A flaw is present in the applications, which fail to handle a crafted WebRTC RTP packet. Successful exploitation allows remote attackers to obtain sensitive information, cause a denial of service, or possibly have unspecified ...

The host is installed with Mozilla Firefox before 43.0 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle a crafted javascript code that leverages history. Successful exploitation allows remote attackers to bypass the same origin policy and obtain sensitive information.

The host is installed with Mozilla Firefox before 43.0 or Firefox ESR 38.x before 38.5 and is prone to an use-after-free vulnerability. A flaw is present in the applications, which fail to handle data channel that has been closed by a WebRTC function. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Mozilla Firefox before 43.0 and is prone to a data mishandling vulnerability. A flaw is present in the application, which fails to handle # (number sign) character in a data: URI. Successful exploitation allows remote attackers to spoof web sites.

The host is installed with Mozilla Firefox before 43.0, Firefox ESR 38.x before 38.5 or Thunderbird 38.x before 38.5 and is prone to an integer overflow vulnerability. A flaw is present in the applications, which fail to handle large texture allocation. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Mozilla Firefox before 43.0 and is prone to an integer overflow vulnerability. A flaw is present in the applications, which fail to handle a crafted MP4 video file that triggers a buffer overflow. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Mozilla Firefox before 43.0, Firefox ESR 38.x before 38.5 or Thunderbird 38.x before 38.5 and is prone to a same origin policy bypass vulnerability. A flaw is present in the applications, which fail to handle data: and view-source: URIs. Successful exploitation allows remote attackers to bypass the Same Origin Policy.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   734

© SecPod Technologies