firefox vulnerabilities and exploits

NA
CVE-2019-0227

Apache Axis could allow a remote attacker to execute arbitrary code on the system. caused by a flaw in the default StockQuoteService.jws service. By using a man-in-the-middle attack to force an HTTP request, an attacker could exploit this vulnerability to execute arbitrary code...

NA
CVE-2018-18512

Please review the referenced Mozilla Foundation Security Advisories and CVE identifiers below for details....

NA
CVE-2013-1691

A Crash Course to Radamsa Radamsa is a test case generator for robustness testing, a.k.a. a fuzzer. It is typically used to test how well a program can withstand malformed and potentially malicious inputs. It works by reading sample files of valid data and generating...

5
CVSSv2
CVE-2019-6481

Abine Blur 7.8.2431 allows remote attackers to conduct "Second-Factor Auth Bypass" attacks by using the "Perform a right-click operation to access a forgotten dev menu to insert user passwords that otherwise would require the user to accept a second-factor request...

NA
CVE-2019-10047

Pydio 8 suffers from cross site scripting, command injection, and various other vulnerabilities....

NA
CVE-2019-100463

Pydio 8 suffers from cross site scripting, command injection, and various other vulnerabilities....

NA
CVE-2019-10046

Pydio could allow a remote attacker to obtain sensitive information, caused by improper input validation by the get_action=display_doc& doc_file=CREDITS request in the index.php script. By sending a specially-crafted HTTP POST request, an attacker could exploit this...

NA
CVE-2019-10048

Pydio could allow a remote authenticated attacker to execute arbitrary commands on the system, caused by improper input validation by the ImageMagick plugin. By sending a specially-crafted request, an attacker could exploit this vulnerability to execute arbitrary commands on the...

NA
CVE-2019-10045

Pydio 8 suffers from cross site scripting, command injection, and various other vulnerabilities....

NA
CVE-2019-10049

Pydio could allow a remote authenticated attacker to gain elevated privileges on the system, caused by improper input validation. By persuading a victim to open a specially-crafted content, an authenticated attacker could exploit this vulnerability to obtain administrative...