[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 2333 Download | Alert*

The host is missing a security update according to Mozilla advisory, MFSA2015-134. The update is required to fix multiple unspecified vulnerabilities. The flaws are present in the applications, which fail to handle unknown vectors. Successful exploitation could allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code.

The host is missing an important security update according to Mozilla advisory, MFSA2015-150. The update is required to fix a server spoofing vulnerability. A flaw is present in the applications, which fail to handle MD5 signatures in Server Key Exchange messages in TLS 1.2 Handshake Protocol traffic. Successful exploitation allows remote attackers to spoof servers by triggering a collision.

The host is missing a critical security update according to Mozilla advisory, MFSA2016-01. The update is required to fix multiple vulnerabilities. A flaw is present in the applications, which fail to handle crafted data. Successful exploitation allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code.

The host is missing a security update according to Mozilla advisory, MFSA2016-02. The update is required to fix a out of memory crash vulnerability. A flaw is present in the application, which fails to properly handle a crafted image file. Successful exploitation allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code.

The host is missing a critical security update according to Mozilla advisory, MFSA2016-03. The update is required to fix a buffer overflow vulnerability. A flaw is present in the applications, which fail to handle crafted data. Successful exploitation allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code.

The host is missing a security update according to Mozilla advisory, MFSA2016-04. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle cookie headers. Successful exploitation allows remote attackers to obtain sensitive information or execute arbitrary code.

The host is missing a critical security update according to Mozilla advisory, MFSA2016-07. The update is required to fix a security bypass vulnerability. A flaw is present in the application, which fails to handle calculations with mp_div and mp_exptmod in Network Security Services (NSS). Successful exploitation allows remote attackers to bypass security restrictions.

The host is missing an important security update according to Mozilla advisory, MFSA2016-09. The update is required to fix a security bypass vulnerability. A flaw is present in the application, which fails to handle a URL which is invalid for an internal protocol is pasted into the addressbar. Successful exploitation allows remote attackers to manipulate the address bar contents to show location.

The host is missing a critical security update according to Mozilla advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation allows remote attackers to execute arbitrary code.

The host is missing a critical security update according to Mozilla advisory, MFSA2016-11. The update is required to fix a security bypass vulnerability. A flaw is present in the application, which fails to properly handle the absence of reputation data. Successful exploitation allows remote attackers to execute arbitrary code.


Pages:      Start    6    7    8    9    10    11    12    13    14    15    16    17    18    19    ..   233

© SecPod Technologies