[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14865 Download | Alert*

Mozilla Firefox 69, Mozilla Firefox ESR 68.1 : Given a compromised sandboxed content process due to a separate vulnerability, it is possible to escape that sandbox by loading <code>accounts.firefox.com</code> in that process and forcing a log-in to a malicious Firefox Sync account. Preference settings that disable the sandbox are then synchronized to the local machine and the compromised browser w ...

The host is installed with Python 2.x through 2.7.16, 3.x through 3.5.7, 3.6.x through 3.6.9 or 3.7.x through 3.7.4 and is prone to a security bypass vulnerability. The flaw is present in the application, which fails to properly handle an issue in parsing email addresses. Successful exploitation allows attackers to trick the application into accepting an email address that should be denied.

The host is installed with Python 2.x through 2.7.16, 3.x through 3.6.9 or 3.7.x through 3.7.4 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle untrusted input with set_server_title. Successful exploitation allows attackers to execute arbitrary JavaScript.

The host is installed with OpenVPN 2.4.x before 2.4.9 and is prone to an illegal client float vulnerability. A flaw is present in the application, which fails to properly handle data channel v2 (P_DATA_V2) packet. Successful exploitation could allow attackers to drop victim's connection.

The host is installed with 7 zip through 18.01 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly implement the "Large memory pages" option. Successful exploitation could allow remote attackers to bypass intended access restrictions.

Mozilla Firefox before 60.0, Firefox, Thunderbird or ESR before 52.8 : Mozilla developers and community members Christoph Diehl, Randell Jesup, Tyson Smith, Alex Gaynor, Ronald Crane, Julian Hector, Kannan Vijayan, and Jason Kratzer reported memory safety bugs present in Firefox and Firefox ESR. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that som ...

Mozilla Firefox before 60.0, Firefox, Thunderbird or ESR before 52.8 : A use-after-free vulnerability can occur while adjusting layout during SVG animations with text paths. This results in a potentially exploitable crash.

Mozilla Firefox before 60.0, Firefox, Thunderbird or ESR before 52.8 : An integer overflow can occur in the Skia library due to 32-bit integer use in an array without integer overflow checks, resulting in possible out-of-bounds writes. This could lead to a potentially exploitable crash triggerable by web content.

Mozilla Firefox before 60.0, Firefox, Thunderbird or ESR before 52.8 : Sites can bypass security checks on permissions to install lightweight themes by manipulating the baseURI property of the theme element. This could allow a malicious site to install a theme without user interaction which could contain offensive or embarrassing images.

Mozilla Firefox ESR before 52.8 or Thunderbird before 52.8: A use-after-free vulnerability can occur while enumerating attributes during SVG animations with clip paths. This results in a potentially exploitable crash.


Pages:      Start    22    23    24    25    26    27    28    29    30    31    32    33    34    35    ..   1486

© SecPod Technologies