[Forgot Password]
Login  Register Subscribe

25354

 
 

132811

 
 

146533

 
 

909

 
 

117189

 
 

156

 
 
Paid content will be excluded from the download.

Filter
Matches : 2042 Download | Alert*

The host is missing a security update according to Mozilla advisory, MFSA 2013-42. The update is required to fix cross-site scripting (XSS) vulnerability. A flaw is present in the applications, which fail to prevent acquisition of chrome privileges during calls to content level constructors. Successful exploitation allows remote attackers to bypass certain read-only restrictions and conduct cross- ...

The host is missing a security update according to Mozilla advisory, MFSA 2013-41. The update is required to fix multiple unspecified vulnerabilities. The flaws are present in the application, which fails to properly handle certain unknown vectors. Successful exploitation allows attackers to cause a denial of service.

The host is missing a critical security update according to Microsoft security bulletin, MS13-055. The update is required to fix multiple remote code execution vulnerabilities. The flaws are present in the application, which fails to properly handle crafted webpage. Successful exploitation could allow attackers to gain the user rights.

Mozilla Developer Bobby Holley and Mozilla security researcher moz_bug_r_a4 discovered a mechanism where XBL scopes can be be used to circumvent XrayWrappers from within the Chrome on unprivileged objects. This allows web content to potentially confuse privileged code and weaken invariants and can lead to cross-site scripting (XSS) attacks.

The host is installed with Mozilla Firefox before 24.0 and is prone to a same-origin bypass vulnerability. A flaw is present in the application, which fails to handle a symlink in conjunction with a file: URL for a local file. Successful exploitation could allow attackers to bypass the Same Origin Policy.

The host is missing an important security update, according to Microsoft security bulletin MS13-103. The update is required to fix a signalR XSS vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to access resources in the context of the targeted user.

The host is missing a critical security update according to Adobe advisory, APSB14-09. The update is required to fix multiple vulnerabilities. The flaws are present in the applications, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is missing a critical security update according to Microsoft bulletin, MS14-022. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly validate certain conditions. Successful exploitation allows attackers to run arbitrary code.

The host is missing an important security update according to Microsoft security bulletin, MS14-032. The update is required to fix an information disclosure vulnerability. A flaw is present in the application, which fails to fails to properly sanitize specially crafted content. Successful exploitation could allow attackers to potentially execute scripts in the users browser to obtain information f ...

The host is missing a critical security update according to Microsoft bulletin, MS14-059. The update is required to fix security feature bypass vulnerability. A flaw is present in the application, which fails to handle a crafted web page. Successful exploitation allows remote attackers to inject arbitrary web script or HTML.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   204

© SecPod Technologies