[Forgot Password]
Login  Register Subscribe

24003

 
 

131401

 
 

103942

 
 

909

 
 

84051

 
 

133

 
 
Paid content will be excluded from the download.

Filter
Matches : 2029 Download | Alert*

The host is missing a critical security update according to Mozilla advisory, MFSA-2015-56. The update is required to fix a security bypass vulnerability. A flaw is present in the application, which fails to handle a crafted web site containing an IFRAME element referencing a different web site that is intended to read this data. Successful exploitation could allow attackers to bypass the Same Ori ...

The host is missing a critical security update according to Mozilla advisory, MFSA-2015-49. The update is required to fix an information disclosure vulnerability. A flaw is present in the application, which does not recognize a referrer policy delivered by a referrer META element in cases of context-menu navigation and middle-click navigation. Successful exploitation could allow attackers to obtai ...

The host is missing a critical security update according to Mozilla advisory, MFSA-2015-50. The update is required to fix an information disclosure vulnerability. A flaw is present in the application, which does not properly determine heap lengths during identification of cases in which bounds checking may be safely skipped. Successful exploitation could allow attackers to trigger out-of-bounds wr ...

The host is missing a critical security update according to Mozilla advisory, MFSA-2015-33. The update is required to fix a security bypass vulnerability. A flaw is present in the applications, which do not properly restrict resource: URLs. Successful exploitation could allow attackers to execute arbitrary JavaScript code with chrome privileges by leveraging the ability to bypass the Same Origin P ...

The host is missing a critical security update according to Mozilla advisory, MFSA-2015-30. The update is required to fix multiple unspecified vulnerabilities. The flaws are present in the applications, which fail to handle unknown vectors. Successful exploitation could allow attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code.

The host is missing an important security update according to Microsoft security bulletin, MS13-086. The update is required to fix multiple remote code execution vulnerabilities. The flaws are present in the applications, which fail to handle specially crafted files. Successful exploitation could allow attackers to execute arbitrary code.

The host is missing a critical security update according to Microsoft security bulletin, MS15-129. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to obtain the same permissions as the currently logged-on user or execute arbitrary code.

The host is missing a security update according to Mozilla advisory, MFSA 2015-02. The update is required to fix an information disclosure vulnerability. A flaw is present in the applications, which do not properly initialize memory for BMP images. Successful exploitation allows attackers to obtain sensitive information from process memory.

The host is missing a security update according to Mozilla advisory, MFSA 2015-03. The update is required to fix a security bypass vulnerability. A flaw is present in the applications, which fail to handle a crafted web site. Successful exploitation allows attackers to bypass intended CORS access-control checks and conduct cross-site request forgery (CSRF) attacks.

The host is missing a security update according to Mozilla advisory, MFSA 2015-04. The update is required to fix a session-fixation vulnerability. A flaw is present in the applications, which do not properly interpret Set-Cookie headers within responses that have a 407 (aka Proxy Authentication Required) status code. Successful exploitation allows remote HTTP proxy servers to conduct session fixat ...


Pages:      Start    169    170    171    172    173    174    175    176    177    178    179    180    181    182    ..   202

© 2013 SecPod Technologies