[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 197798 Download | Alert*

The host is missing a security update according to Mozilla advisory, MFSA2015-86. The update is required to fix a mixed-content protection mechanism bypass vulnerability. A flaw is present in the application, which fails to properly handle a feed: URL in a POST request. Successful exploitation could allow attackers to bypass a mixed-content protection mechanism.

The host is installed with Mozilla Firefox before 40.0 and is prone to a mixed-content protection mechanism bypass vulnerability. A flaw is present in the application, which fails to properly handle a feed: URL in a POST request. Successful exploitation could allow attackers to bypass a mixed-content protection mechanism.

The host is missing a security update according to Mozilla advisory, MFSA2015-91. The update is required to fix a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly implement the Content Security Policy Level 2 exceptions for the blob, data, and filesystem URL schemes during wildcard source-expression matching. Successful exploitation could allow atta ...

The host is installed with Mozilla Firefox before 40.0 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly implement the Content Security Policy Level 2 exceptions for the blob, data, and filesystem URL schemes during wildcard source-expression matching. Successful exploitation could allow attackers to conduct cross-site scripting (XS ...

The host is missing a critical security update according to Mozilla advisory, MFSA2015-93. The update is required to fix multiple integer overflow vulnerabilities. The flaws are present in the application, which fails to properly handle crafted sample metadata. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Mozilla Firefox before 38.0 and is prone to multiple integer overflow vulnerabilities. The flaws are present in the application, which fails to properly handle crafted sample metadata. Successful exploitation could allow attackers to execute arbitrary code.

The host is missing a critical security update according to Mozilla advisory, MFSA-2015-68. The update is required to fix an information disclosure vulnerability. A flaw is present in the applications, which include native key press information during the logging of crashes. Successful exploitation could allow attackers to obtain sensitive information.

The host is installed with Mozilla Firefox before 39.0 and is prone to an information disclosure vulnerability. A flaw is present in the applications, which include native key press information during the logging of crashes. Successful exploitation could allow attackers to obtain sensitive information.

The host is installed with Mozilla Firefox before 39.0 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to handle unknown vectors. Successful exploitation could allow attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code.

The host is missing a critical security update according to Mozilla advisory, MFSA-2015-56. The update is required to fix a security bypass vulnerability. A flaw is present in the application, which fails to handle a crafted web site containing an IFRAME element referencing a different web site that is intended to read this data. Successful exploitation could allow attackers to bypass the Same Ori ...


Pages:      Start    9298    9299    9300    9301    9302    9303    9304    9305    9306    9307    9308    9309    9310    9311    ..   19779

© SecPod Technologies