The host is installed with Mozilla Firefox before 39.0 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to handle unknown vectors. Successful exploitation could allow attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code.
The host is installed with Mozilla Firefox before 38.0 and is prone to multiple unspecified vulnerabilities. The flaws are present in the application, which fails to handle unknown vectors. Successful exploitation could allow attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code.
The host is installed with Mozilla Firefox before 38.0 and is prone to an information disclosure vulnerability. A flaw is present in the application, which does not properly determine heap lengths during identification of cases in which bounds checking may be safely skipped. Successful exploitation could allow attackers to trigger out-of-bounds write operations and possibly execute arbitrary code, ...
The host is installed with Mozilla Firefox before 38.0 and is prone to an information disclosure vulnerability. A flaw is present in the application, which does not recognize a referrer policy delivered by a referrer META element in cases of context-menu navigation and middle-click navigation. Successful exploitation could allow attackers to obtain sensitive information.
The host is installed with Mozilla Firefox before 38.0 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a crafted web site containing an IFRAME element referencing a different web site that is intended to read this data. Successful exploitation could allow attackers to bypass the Same Origin Policy and obtain sensitive webchannel-response ...
The host is installed with Mozilla Firefox before 38.0 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle an MP4 video file containing invalid metadata. Successful exploitation could allow attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow and out-of-bounds read).
The host is installed with Mozilla Firefox before 38.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle an improper Media Decoder Thread creation at the time of a shutdown. Successful exploitation could allow attackers to execute arbitrary code or cause a denial of service (use-after-free and heap memory corruption).
The host is installed with Mozilla Firefox before 37.0.2 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle a crafted plugin that does not properly complete initialization. Successful exploitation could allow attackers to execute arbitrary code or cause a denial of service (use-after-free).
The host is installed with Mozilla Firefox before 37.0.1 and is prone to a security bypass vulnerability. A flaw is present in the application, which does not properly handle an Alt-Svc header specification in the HTTP/2 response. Successful exploitation could allow attackers to bypass the SSL certificate verification for the specified alternate server.
The host is installed with Mozilla Firefox before 37.0 and is prone to clickjacking vulnerabilities. The flaws are present in the application, which fails to handle a Flash object in conjunction with DIV elements associated with layered presentation and crafted JavaScript code that interacts with an IMG element. Successful exploitation could allow attackers to conduct clickjacking attacks.