[Forgot Password]
Login  Register Subscribe

23631

 
 

126998

 
 

101924

 
 

909

 
 

80911

 
 

121

 
 
Paid content will be excluded from the download.

Filter
Matches : 1971 Download | Alert*

The host is missing an important security update according to Mozilla advisory, MFSA2016-45. The update is required to fix a cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to handle web content sent with the multipart/x-mixed-replace MIME type. Successful exploitation allows remote attackers to cause unspecified impact.

The host is missing an important security update according to Mozilla advisory, MFSA2016-46. The update is required to fix a cross-site scripting (XSS) vulnerability. A flaw is present in the chrome.tabs.update API for web extensions, which allows for navigation to javascript: URLs without additional permissions. Successful exploitation allows remote attackers to elevate privilege for a universal ...

The host is missing an important security update according to Mozilla advisory, MFSA2016-48. The update is required to fix a cross-site scripting (XSS) vulnerability. A flaw is present in the Firefox Health Report (about:healthreport), which accepts certain events from any content document present in the remote-report iframe. Successful exploitation allows remote attackers to have unspecified impa ...

The host is missing an important security update according to Mozilla advisory, MFSA2016-42. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle unspecified vectors. Successful exploitation allows remote attackers to cause unspecified impact.

The host is missing an important security update according to Mozilla advisory, MFSA2016-26. The update is required to fix a denial of service vulnerability. A flaw is present in the application, which fails to handle FileReader API while changing a file during a read operation. Successful exploitation allows local users to gain privileges or cause a denial of service (memory corruption).

The host is missing an important security update according to Mozilla advisory, MFSA2016-29. The update is required to fix an information disclosure vulnerability. A flaw is present in the application, which fails to properly restrict the availability of IFRAME Resource Timing API times. Successful exploitation allows remote attackers to bypass the Same Origin Policy and obtain sensitive informati ...

The host is missing an important security update according to Mozilla advisory, MFSA2016-30. The update is required to fix a denial of service vulnerability. A flaw is present in the application, which fails to handle crafted data with brotli compression. Successful exploitation allows remote attackers to cause a denial of service (buffer overflow).

The host is missing an important security update according to Mozilla advisory, MFSA2016-22. The update is required to fix a denial of service vulnerability. A flaw is present in the application, which fails to handle unspecified use of the Clients API. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read and memory corruption).

The host is missing an important security update according to Mozilla advisory, MFSA2016-13. The update is required to fix a same origin policy bypass vulnerability. A flaw is present in the application, which fail to handle a crafted web site. Successful exploitation allows remote attackers to bypass the same origin policy.

The host is missing a critical security update according to Microsoft security bulletin, MS16-006. The update is required to fix a remote code execution vulnerability. A flaw is present in the application, which properly decodes strings using a malicious decoder that can return negative offsets. An attacker who successfully exploited this vulnerability could obtain the same permissions as the curr ...


Pages:      Start    166    167    168    169    170    171    172    173    174    175    176    177    178    179    ..   197

© 2013 SecPod Technologies