[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 196303 Download | Alert*

The host is missing an important security update according to Mozilla advisory, MFSA2015-78. The update is required to fix a same origin policy bypass vulnerability. A flaw is present in the applications, which fail to handle vectors involving crafted JavaScript code and a native setter. Successful exploitation could allow attackers to bypass the Same Origin Policy, and read arbitrary files or gai ...

The host is installed with Mozilla Firefox before 40.0.3 or Firefox ESR 38.x before 38.2.1 and is prone to an use-after-free vulnerability. A flaw is present in the applications, which fail to handle unknown vectors. Successful exploitation could allow attackers to execute arbitrary code by leveraging improper interaction between resize events and changes to Cascading Style Sheets (CSS) token sequ ...

The host is missing an important security update according to Mozilla advisory, MFSA2015-94. The update is required to fix an use-after-free vulnerability. A flaw is present in the applications, which fail to handle unknown vectors. Successful exploitation could allow attackers to execute arbitrary code by leveraging improper interaction between resize events and changes to Cascading Style Sheets ...

The host is installed with Mozilla Firefox before 40.0.3 or Firefox ESR 38.x before 38.2.1 and is prone to a security bypass vulnerability. A flaw is present in the applications, which fail to handle a crafted data: URL. Successful exploitation could allow attackers to bypass an intended user-confirmation requirement by constructing a crafted data: URL and triggering navigation to an arbitrary htt ...

The host is missing an important security update according to Mozilla advisory, MFSA2015-95. The update is required to fix a security bypass vulnerability. A flaw is present in the applications, which fail to handle a crafted data: URL. Successful exploitation could allow attackers to bypass an intended user-confirmation requirement by constructing a crafted data: URL and triggering navigation to ...

The host is installed with Oracle MySQL 5.5.x through 5.5.43 or MySQL 5.6.x through 5.6.24 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to GIS. Successful exploitation allows remote authenticated users to affect availability.

The host is installed with Oracle MySQL 5.5.x through 5.5.43 or MySQL 5.6.x through 5.6.24 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to Server : Optimizer. Successful exploitation allows remote authenticated users to affect availability.

The host is installed with Oracle MySQL 5.5.x through 5.5.43 or MySQL 5.6.x through 5.6.24 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to DML. Successful exploitation allows remote authenticated users to affect availability.

The host is installed with Oracle MySQL 5.5.x through 5.5.43 or MySQL 5.6.x through 5.6.24 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to Server : I_S. Successful exploitation allows remote authenticated users to affect availability.

The host is installed with Oracle MySQL 5.5.x through 5.5.43 or MySQL 5.6.x through 5.6.23 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to Server : Security : Privileges. Successful exploitation allows remote authenticated users to affect confidentiality.


Pages:      Start    7682    7683    7684    7685    7686    7687    7688    7689    7690    7691    7692    7693    7694    7695    ..   19630

© SecPod Technologies