Cross site scripting vulnerability in Mozilla Firefox or Firefox ESR by appending whitespace characters to an IP address string - MFSA2015-122ID: oval:org.secpod.oval:def:31588 | Date: (C)2015-11-24 (M)2024-03-27 |
Class: PATCH | Family: windows |
The host is missing a security update according to Mozilla advisory, MFSA2015-122. The update is required to fix a cross site scripting vulnerability. A flaw is present in the applications, which fail to properly handle whitepsace characters in an IP address string. Successful exploitation could allow remote attackers to bypass the Same Origin Policy for an IP address origin.
Platform: |
Microsoft Windows Server 2022 |
Microsoft Windows 11 |
Microsoft Windows Server 2019 |
Microsoft Windows Server 2016 |
Microsoft Windows XP |
Microsoft Windows Server 2003 |
Microsoft Windows Vista |
Microsoft Windows Server 2008 |
Microsoft Windows 7 |
Microsoft Windows Server 2008 R2 |
Microsoft Windows 8 |
Microsoft Windows 10 |
Microsoft Windows Server 2012 |
Microsoft Windows 8.1 |
Microsoft Windows Server 2012 R2 |
Product: |
Mozilla Firefox ESR |
Mozilla Firefox |