[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 197798 Download | Alert*

The host is missing a security update according to Mozilla advisory, MFSA2015-129. The update is required to fix an information disclosure vulnerability. A flaw is present in the application, which fails to properly recognize escaped characters in hostnames within Location headers. Successful exploitation could allow attackers to obtain sensitive information.

The host is installed with Mozilla Firefox before 42.0 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly recognize escaped characters in hostnames within Location headers. Successful exploitation could allow attackers to obtain sensitive information.

The host is missing an important security update according to Mozilla advisory, MFSA2015-115. The update is required to fix a same origin policy bypass vulnerability. A flaw is present in the application, which fails to properly handle a crafted web site. Successful exploitation could allow attackers to bypass the Same Origin Policy.

firefox: Mozilla Open Source web browser Firefox could be made to expose sensitive information across origins

Mozilla Firefox is an open-source web browser, designed for standards compliance, performance and portability.

The host is installed with Mozilla Firefox before 41.0.2 and is prone to a same origin policy bypass vulnerability. A flaw is present in the application, which fails to properly handle a crafted web site. Successful exploitation could allow attackers to bypass the Same Origin Policy.

The host is installed with Mozilla Firefox 3.6 before 3.6.23 or Firefox 6 and is prone to multiple memory safety vulnerabilities. A flaw is present in the application, which fails to sanitize user supplied input. Successful exploitation could allow attackers to crash the service or execute arbitrary code.

The host is installed with Firefox 6 before 7 and is prone to multiple unspecified vulnerabilities. The flaws are present in the applications, which fails to sanitize user supplied input. Successful exploitation could allow attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.

The host is installed with Mozilla Firefox before 7.0 or SeaMonkey before 2.4 and is prone to a denial of service vulnerability. A flaw is present in the applications, which fails to validate the return value of a GrowAtomTable function call. Successful exploitation could allow attackers to crash the service.

The host is installed with Mozilla Firefox before 7.0 and SeaMonkey before 2.4 and is prone to a denial of service vulnerability. A flaw is present in the applications, which fail to handle an unspecified WebGL test case that triggers a memory-allocation error and a resulting out-of-bounds write operation. Successful exploitation could allow attackers to crash the service.


Pages:      Start    9295    9296    9297    9298    9299    9300    9301    9302    9303    9304    9305    9306    9307    9308    ..   19779

© SecPod Technologies