Cross site scripting vulnerability in Mozilla Firefox or Firefox ESR by appending whitespace characters to an IP address string - MFSA2015-122ID: oval:org.secpod.oval:def:31619 | Date: (C)2015-11-24 (M)2024-01-29 |
Class: PATCH | Family: macos |
The host is missing a security update according to Mozilla advisory, MFSA2015-122. The update is required to fix a cross site scripting vulnerability. A flaw is present in the applications, which fail to properly handle whitepsace characters in an IP address string. Successful exploitation could allow remote attackers to bypass the Same Origin Policy for an IP address origin.
Platform: |
Apple Mac OS 14 |
Apple Mac OS 13 |
Apple Mac OS 12 |
Apple Mac OS 11 |
Apple Mac OS X 10.15 |
Apple Mac OS X 10.14 |
Apple Mac OS X 10.12 |
Apple Mac OS X 10.13 |
Apple Mac OS X 10.11 |
Apple Mac OS X 10.9 |
Apple Mac OS X 10.10 |
Apple Mac OS X Server 10.11 |
Apple Mac OS X Server 10.9 |
Apple Mac OS X Server 10.10 |
Product: |
Mozilla Firefox |
Mozilla Firefox ESR |