[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256369

 
 

909

 
 

199183

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 2048 Download | Alert*

The host is missing an important security update according to Mozilla advisory, MFSA2015-128. The update is required to fix a buffer underflow vulnerability. A flaw is present in the applications, which fail to properly handle a crafted ZIP archive. Successful exploitation could allow attackers to crash the service.

The host is missing an important security update according to Mozilla advisory, MFSA2015-127. The update is reqiored to fix a same origin policy bypass vulnerability. A flaw is present in the applications, which fail to properly follow the CORS cross-origin request algorithm for the POST method in situations involving an unspecified Content-Type header manipulation. Successful exploitation could a ...

The host is missing an important security update according to Mozilla advisory, MFSA2015-123. The update is required to fix a heap-based buffer overflow vulnerability. A flaw is present in the applications, which fail to properly handle vectors involving a CANVAS element and crafted JavaScript code. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is missing a security update according to Mozilla advisory, MFSA2015-122. The update is required to fix a cross site scripting vulnerability. A flaw is present in the applications, which fail to properly handle whitepsace characters in an IP address string. Successful exploitation could allow remote attackers to bypass the Same Origin Policy for an IP address origin.

The host is missing a security update according to Mozilla advisory, MFSA2015-121. The update is required to fix a cross site scripting vulnerability. A flaw is present in the application, which fails to properly handle inline JavaScript code. Successful exploitation could allow attackers to conduct cross-site scripting (XSS) attacks.

The host is missing a critical security update according to Mozilla advisory, MFSA2015-133. The update is required to fix multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is missing a security update according to Mozilla advisory, MFSA2015-118. The update is required to fix a denial of service vulnerability. A flaw is present in the application, which fails to properly handle vectors involving SVG animations and the about:reader URL. Successful exploitation could allow attackers to bypass the Content Security Policy (CSP) protection mechanism and conduct c ...

The host is missing a security update according to Mozilla advisory, MFSA2015-117. The update is required to fix an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a crafted web site that sends an NTLM request and reads the Workstation field of an NTLM type 3 message. Successful exploitation could allow attackers to obtain sensitive hostna ...

The host is missing a critical security update according to Mozilla advisory, MFSA2015-116. The update is required to fix multiple unspecified vulnerabilities. The flaws are present in the applications, which fail to properly handle unknown vectors. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is missing a security update according to MFSA 2014-84. The update is required to fix a security bypass vulnerability. A flaw is present in the applications, which fail to handle an XBL binding. Successful exploitation allows attackers to bypass intended access restrictions.


Pages:      Start    25    26    27    28    29    30    31    32    33    34    35    36    37    38    ..   204

© SecPod Technologies