[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 195419 Download | Alert*

Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 91.3.0 ESR. Security Fix: * Mozilla: Use-after-free in HTTP2 Session object * Mozilla: Memory safety bugs fixed in Firefox 94 and Firefox ESR 91.3 * Mozilla: iframe sandbox rules did not apply to XSLT stylesheets * Mozilla: Use-after-free in file ...

The host is missing a high severity security update according to the Mozilla advisory MFSA2021-49 and is prone to multiple vulnerabilities. The flas are present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows an attacker to have unspecified impact.

The host is missing a critical severity security update according to Mozilla advisory, MFSA2020-03. The update is required to fix type confusion vulnerabilities. The flaws are present in the application, which fails to handle Incorrect alias information in IonMonkey JIT compiler. Successful exploitation can cause unspecified impact.

The host is missing a security update according to Apple advisory, APPLE-SA-2019-10-07-4. The update is required to fix multiple vulnerabilities. The flaws are present in the application which fails to handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

The host is missing a security update according to Apple advisory, APPLE-SA-2019-10-07-2. The update is required to fix multiple vulnerabilities. The flaws are present in the application which fails to handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Apple iTunes before 12.10.1 or Apple iCloud before 7.14 and is prone to an arbitrary code execution vulnerability. A flaw is present in the applications, which fail to properly handle buffer overflow. Successful exploitation could allow attackers to execute arbitrary code through a maliciously crafted text file.

The host is installed with Apple MacOS X 10.13.6, 10.14.6 and before 10.13 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation could allow attackers to execute arbitrary code with kernel privileges.

The host is installed with Apple MacOS X 10.13.6, 10.14.6 and before 10.13 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation could allow attackers to disclose the process memory.

The host is installed with Apple MacOS X before 10.15 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a state related issue. Successful exploitation could allow attackers to encounter a race condition when reading and writing user preferences.

The host is installed with Apple MacOS X before 10.15 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a memory related issue. Successful exploitation could allow attackers to execute arbitrary code with system privileges.


Pages:      Start    10440    10441    10442    10443    10444    10445    10446    10447    10448    10449    10450    10451    10452    10453    ..   19541

© SecPod Technologies