[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

243238

 
 

909

 
 

192833

 
 

277

Paid content will be excluded from the download.


Download | Alert*
OVAL

Cross site scripting vulnerability in Mozilla Firefox or Firefox ESR by appending whitespace characters to an IP address string - MFSA2015-122

ID: oval:org.secpod.oval:def:31619Date: (C)2015-11-24   (M)2024-01-29
Class: PATCHFamily: macos




The host is missing a security update according to Mozilla advisory, MFSA2015-122. The update is required to fix a cross site scripting vulnerability. A flaw is present in the applications, which fail to properly handle whitepsace characters in an IP address string. Successful exploitation could allow remote attackers to bypass the Same Origin Policy for an IP address origin.

Platform:
Apple Mac OS 14
Apple Mac OS 13
Apple Mac OS 12
Apple Mac OS 11
Apple Mac OS X 10.15
Apple Mac OS X 10.14
Apple Mac OS X 10.12
Apple Mac OS X 10.13
Apple Mac OS X 10.11
Apple Mac OS X 10.9
Apple Mac OS X 10.10
Apple Mac OS X Server 10.11
Apple Mac OS X Server 10.9
Apple Mac OS X Server 10.10
Product:
Mozilla Firefox
Mozilla Firefox ESR
Reference:
MFSA2015-122
CVE-2015-7188
CVE    1
CVE-2015-7188
CPE    10
cpe:/a:mozilla:firefox_esr:38.1.1
cpe:/a:mozilla:firefox_esr:38.2.0
cpe:/a:mozilla:firefox_esr:38.0.1
cpe:/a:mozilla:firefox_esr:38.1.0
...

© SecPod Technologies