[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247974

 
 

909

 
 

194654

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 2079 Download | Alert*

The host is missing an important security update according to Mozilla advisory, MFSA2016-64. The update is required to fix a buffer overflow vulnerability. A flaw is present in the applications, which improperly render SVG format graphics with directional content. Successful exploitation allows remote attackers to crash the service.

The host is missing an important security update according to Mozilla advisory, MFSA2016-66. The update is required to fix a location bar spoofing vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation allows remote attackers to perform potential spoofing in the Location bar by using non-ASCII and emoji characters in a data: url's mediat ...

The host is missing an important security update according to Mozilla advisory, MFSA2016-67. The update is required to fix a stack underflow vulnerability. A flaw is present in the application, which improperly calculates clipping regions in 2D graphics. Successful exploitation allows remote attackers to crash the service.

The host is missing an important security update according to Mozilla advisory, MFSA2016-68. The update is required to fix an out-of-bounds read vulnerability. A flaw is present in the application, which fail to handle malformed XML data. Successful exploitation allows remote attackers to read other inaccessible memory.

The host is missing an important security update according to Mozilla advisory, MFSA2016-69. The update is required to fix an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation allows remote attackers to perform arbitrary code execution.

The host is missing an important security update according to Mozilla advisory, MFSA2016-70. The update is required to fix an use-after-free vulnerability. A flaw is present in the application, which fails to handle alt key used in conjunction with toplevel menu items. Successful exploitation allows remote attackers to crash the service.

The host is missing an important security update according to Mozilla advisory, MFSA2016-71. The update is required to fix an use-after-free vulnerability. A flaw is present in the application, which fails to handle objects and pointers during incremental garbage collection in some circumstances working with object groups. Successful exploitation allows remote attackers to crash the service.

The host is missing an important security update according to Mozilla advisory, MFSA2016-72. The update is required to fix an use-after-free vulnerability. A flaw is present in the applications, which fail to handle DTLS objects in memory that are freed while still actively in use during WebRTC session shutdown. Successful exploitation allows remote attackers to crash the service.

The host is missing an important security update according to Mozilla advisory, MFSA2016-73. The update is required to fix an use-after-free vulnerability. A flaw is present in the applications, which fail to handle a nested sync event. Successful exploitation allows remote attackers to crash the service.

The host is missing an important security update according to Mozilla advisory, MFSA2016-74. The update is required to fix an information disclosure vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation allows attackers to display password data if he could find a way to read the session restoration file.


Pages:      Start    4    5    6    7    8    9    10    11    12    13    14    15    16    17    ..   207

© SecPod Technologies