[Forgot Password]
Login  Register Subscribe

24436

 
 

131815

 
 

115228

 
 

909

 
 

90122

 
 

140

 
 
Paid content will be excluded from the download.

Filter
Matches : 1064 Download | Alert*

The host is missing an important security update according to Mozilla advisory, MFSA2016-60. The update is required to fix a content security policy bypass vulnerability. A flaw is present in the application, which fails to handle cross-domain Java applets. Successful exploitation allows remote attackers to get through malicious site to manipulate content through a Java applet to bypass CSP protec ...

The host is missing an important security update according to Mozilla advisory, MFSA2016-58. The update is required to fix a privilege escalation vulnerability. A flaw is present in the application, which fail to handle unknown vectors. Successful exploitation allows remote attackers to escalate permissions, spoofing and clickjacking attacks against the browser UI.

The host is missing a security update according to Mozilla advisory, MFSA2016-57. The update is required to fix a privilege escalation vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation allows remote attackers lead to user confusion and inadvertent consent given when a user is prompted by web content to give permissions, such as for ...

The host is missing a security update according to Mozilla advisory, MFSA2016-55. The update is required to fix a privilege escalation vulnerability. A flaw is present in the application, which fail to handle unknown vectors. Successful exploitation allows remote attackers to use Mozilla Windows updater and overwrite arbitrary files.

The host is missing an important security update according to Mozilla advisory, MFSA2016-54. The update is required to fix a same-origin-policy bypass vulnerability. A flaw is present in the application, which fail to handle unknown vectors. Successful exploitation allows remote attackers to bypass of some same-origin policy protections.

The host is missing an important security update according to Mozilla advisory, MFSA2016-52. The update is required to fix an addressbar spoofing vulnerability. A flaw is present in the application, which fail to handle unknown vectors. Successful exploitation allows remote attackers to mask the true site URL, allowing for spoofing by a malicious site.

The host is missing an important security update according to Mozilla advisory, MFSA2016-70. The update is required to fix an use-after-free vulnerability. A flaw is present in the application, which fails to handle alt key used in conjunction with toplevel menu items. Successful exploitation allows remote attackers to crash the service.

The host is missing an important security update according to Mozilla advisory, MFSA2016-71. The update is required to fix an use-after-free vulnerability. A flaw is present in the application, which fails to handle objects and pointers during incremental garbage collection in some circumstances working with object groups. Successful exploitation allows remote attackers to crash the service.

The host is missing an important security update according to Mozilla advisory, MFSA2016-72. The update is required to fix an use-after-free vulnerability. A flaw is present in the applications, which fail to handle DTLS objects in memory that are freed while still actively in use during WebRTC session shutdown. Successful exploitation allows remote attackers to crash the service.

The host is missing an important security update according to Mozilla advisory, MFSA2016-73. The update is required to fix an use-after-free vulnerability. A flaw is present in the applications, which fail to handle a nested sync event. Successful exploitation allows remote attackers to crash the service.


Pages:      Start    95    96    97    98    99    100    101    102    103    104    105    106    ..   106

© SecPod Technologies