[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 197798 Download | Alert*

The host is missing a critical security update according to Mozilla advisory, MFSA-2015-45. The update is required to fix an use-after-free vulnerability. A flaw is present in the application, which fails to handle a crafted plugin that does not properly complete initialization. Successful exploitation could allow attackers to execute arbitrary code or cause a denial of service (use-after-free).

firefox: Mozilla Open Source web browser Firefox could be made to crash or run programs as your login if it opened a malicious website.

The host is installed with Mozilla Firefox before 37.0.2 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle a crafted plugin that does not properly complete initialization. Successful exploitation could allow attackers to execute arbitrary code or cause a denial of service (use-after-free).

The host is missing a critical security update according to Mozilla advisory, MFSA-2015-44. The update is required to fix a security bypass vulnerability. A flaw is present in the application, which does not properly handle an Alt-Svc header specification in the HTTP/2 response. Successful exploitation could allow attackers to bypass the SSL certificate verification for the specified alternate ser ...

firefox: Mozilla Open Source web browser Firefox could be made to bypass SSL certificate verification.

The host is installed with Mozilla Firefox before 37.0.1 and is prone to a security bypass vulnerability. A flaw is present in the application, which does not properly handle an Alt-Svc header specification in the HTTP/2 response. Successful exploitation could allow attackers to bypass the SSL certificate verification for the specified alternate server.

The host is missing a critical security update according to Mozilla advisory, MSFA-2015-35. The update is required to clickjacking vulnerabilities. The flaws are present in the application, which fails to handle a Flash object in conjunction with DIV elements associated with layered presentation and crafted JavaScript code that interacts with an IMG element. Successful exploitation could allow att ...

The host is installed with Mozilla Firefox before 37.0 and is prone to clickjacking vulnerabilities. The flaws are present in the application, which fails to handle a Flash object in conjunction with DIV elements associated with layered presentation and crafted JavaScript code that interacts with an IMG element. Successful exploitation could allow attackers to conduct clickjacking attacks.

The host is missing a critical security update according to Mozilla advisory, MSFA-2015-42. The update is required to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle certain content navigation that leverages the reachability of a privileged window with an unintended persistence of access to restricted internal methods. Successful exploitation ...

The host is installed with Mozilla Firefox before 37.0 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle certain content navigation that leverages the reachability of a privileged window with an unintended persistence of access to restricted internal methods. Successful exploitation could allow attackers to execute arbitrary Java ...


Pages:      Start    9300    9301    9302    9303    9304    9305    9306    9307    9308    9309    9310    9311    9312    9313    ..   19779

© SecPod Technologies