[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 197798 Download | Alert*

The host is installed with Mozilla Firefox before 45.0 and is prone to an integer underflow vulnerability. A flaw is present in the Brotli in Mozilla Firefox, which fails to handle crafted data with brotli compression. Successful exploitation allows remote attackers to cause a denial of service (buffer overflow).

The host is installed with Mozilla Firefox before 45.0 or Firefox ESR 38.x before 38.6.1 and is prone to a denial of service vulnerability. A flaw is present in the setAttr in Mozilla Firefox, which fails to handle unknown vectors. Successful exploitation allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unknown other impact.

The host is installed with Mozilla Firefox before 44.0.2 and is prone to a same origin policy bypass vulnerability. A flaw is present in the application, which fail to handle a crafted web site. Successful exploitation allows remote attackers to bypass the same origin policy.

firefox: Mozilla Open Source web browser A same-origin-policy bypass was discovered in Firefox.

The host is missing an important security update according to Mozilla advisory, MFSA2016-13. The update is required to fix a same origin policy bypass vulnerability. A flaw is present in the application, which fail to handle a crafted web site. Successful exploitation allows remote attackers to bypass the same origin policy.

The host is installed with Mozilla Firefox before 43.0 or Firefox ESR 38.x before 38.6.1 and is prone to an information disclosure vulnerability. A flaw is present in the applications, which fail to handle a crafted graphite smart font. Successful exploitation allows remote attackers to obtain sensitive information or cause a denial of service (out-of-bounds read and application crash).

The host is missing a critical security update according to Mozilla advisory, MFSA2016-08. The update is required to fix a clickjacking attack vulnerability. A flaw is present in the application, which fails to properly handle delay between the download dialog getting focus and the button getting enabled was too short. Successful exploitation could lead unintentional actions such as the running of ...

The host is installed with Mozilla Firefox before 44.0 and is prone to a clickjacking attack vulnerability. A flaw is present in the application, which fails to properly handle delay between the download dialog getting focus and the button getting enabled was too short. Successful exploitation could lead unintentional actions such as the running of downloaded software.

The host is missing a critical security update according to Mozilla advisory, MFSA2016-11. The update is required to fix a security bypass vulnerability. A flaw is present in the application, which fails to properly handle the absence of reputation data. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Mozilla Firefox 43.x and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle the absence of reputation data. Successful exploitation allows remote attackers to execute arbitrary code.


Pages:      Start    9292    9293    9294    9295    9296    9297    9298    9299    9300    9301    9302    9303    9304    9305    ..   19779

© SecPod Technologies