[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 1792 Download | Alert*

The host is missing an important security update according to Mozilla advisory, MFSA2016-09. The update is required to fix a security bypass vulnerability. A flaw is present in the application, which fails to handle a URL which is invalid for an internal protocol is pasted into the addressbar. Successful exploitation allows remote attackers to manipulate the address bar contents to show location.

The host is missing a security update according to Mozilla advisory, MFSA2016-04. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle cookie headers. Successful exploitation allows remote attackers to obtain sensitive information or execute arbitrary code.

The host is missing a security update according to Mozilla advisory, MFSA2016-06. The update is required to fix an UI timing attack vulnerability. A flaw is present in the application, which fails to properly handle double click events. Successful exploitation allows remote attackers to cause a denial of service (memory corruption and application crash).

The host is missing a security update according to Mozilla advisory, MFSA2016-02. The update is required to fix a out of memory crash vulnerability. A flaw is present in the application, which fails to properly handle a crafted image file. Successful exploitation allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code.

The host is missing a critical security update according to Mozilla advisory, MFSA2015-126. The update is required to fix a denial of service vulnerability. The flaws are present in the application, which fails to properly handle an NSAccessibilityIndexAttribute value to reference a row index. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is missing a security update according to Mozilla advisory, MFSA2015-117. The update is required to fix an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a crafted web site that sends an NTLM request and reads the Workstation field of an NTLM type 3 message. Successful exploitation could allow attackers to obtain sensitive hostna ...

The host is missing a security update according to Mozilla advisory, MFSA2015-118. The update is required to fix a denial of service vulnerability. A flaw is present in the application, which fails to properly handle vectors involving SVG animations and the about:reader URL. Successful exploitation could allow attackers to bypass the Content Security Policy (CSP) protection mechanism and conduct c ...

The host is missing a security update according to Mozilla advisory, MFSA2015-121. The update is required to fix a cross site scripting vulnerability. A flaw is present in the applications, which fail to properly handle inline JavaScript code. Successful exploitation could allow attackers to conduct cross-site scripting (XSS) attacks.

The host is missing a security update according to Mozilla advisory, MFSA2015-129. The update is required to fix an information disclosure vulnerability. A flaw is present in the application, which fails to properly recognize escaped characters in hostnames within Location headers. Successful exploitation could allow attackers to obtain sensitive information.

The host is missing an important security update according to Mozilla advisory, MFSA2015-115. The update is required to fix a same origin policy bypass vulnerability. A flaw is present in the application, which fails to properly handle a crafted web site. Successful exploitation could allow attackers to bypass the Same Origin Policy.


Pages:      Start    118    119    120    121    122    123    124    125    126    127    128    129    130    131    ..   179

© SecPod Technologies