[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

247085

 
 

909

 
 

194218

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15730 Download | Alert*

Mozilla Firefox 70 : A compromised content process could send a message to the parent process that would cause the 'Click to Play' permission prompt to be shown. However, due to lack of validation from the parent process, if the user accepted the permission request an attacker-controlled permission would be granted rather than the 'Click to Play' permission.

The host is installed with Google Chrome before 68.0.3440.75 and is prone to a heap buffer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

Mozilla Firefox 70 : An object tag with a data URI did not correctly inherit the document's Content Security Policy. This allowed a CSP bypass in a cross-origin frame if the document's policy explicitly allowed codedata:/code URIs.

Mozilla Firefox 70 : A Content-Security-Policy that blocks in-line scripts could be bypassed using an object tag to execute JavaScript in the protected document (cross-site scripting). This is a separate bypass from CVE-2019-17000.

Mozilla Firefox 70 : If codeupgrade-insecure-requests/code was specified in the Content Security Policy, and a link was dragged and dropped from that page, the link was not upgraded to https.

The host is installed with JetBrains PyCharm before 2020.3.4 and is prone to a local code execution vulnerability. A flaw is present in the application, which fails to properly handle checks issue when getting the project from VCS. Successful exploitation allows attackers to execute code without user confirmation for untrusted projects.

The host is installed with JetBrains PyCharm before 2019.2 and is prone to an out of bounds memory allocation vulnerability. A flaw is present in the application, which fails to properly handle a buffer allocation of unknown size issue. Successful exploitation allows attackers to lead to a remote invocation of an OOM error message because of uncontrolled memory allocation.

The host is installed with JetBrains PyCharm before 2022.1 and is prone to an exposure of resource to wrong sphere vulnerability. A flaw is present in the application, which fails to properly handle issues in the debugger port. Successful exploitation allows attackers to expose the debugger port to the internal network.

The host is installed with Apple QuickTime before 7.7 and is prone to buffer overflow vulnerability. A flaw is present in the application which fails to properly handle JPEG files. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.

The host is installed with Microsoft Edge before 122.0.2365.92 and is prone to security feature bypass vulnerability. A flaw is present in the application, which fails to handle a specially crafted website. Successful exploitation allows attackers to cause browser sandbox escape.


Pages:      Start    10    11    12    13    14    15    16    17    18    19    20    21    22    23    ..   1572

© SecPod Technologies