[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31403 Download | Alert*

Mozilla Firefox 70, Mozilla Firefox ESR 68.2 and Mozilla Thunderbird 68.2: By using a form with a data URI it was possible to gain access to the privileged codeJSONView/code object that had been cloned into content. Impact from exposing this object appears to be minimal, however it was a bypass of existing defense in depth mechanisms.

Mozilla Firefox 70, Mozilla Firefox ESR 68.2 and Mozilla Thunderbird 68.2: If two same-origin documents set document.domain differently to become cross-origin, it was possible for them to call arbitrary DOM methods/getters/setters on the now-cross-origin window.

Mozilla Firefox 70, Mozilla Firefox ESR 68.2 and Mozilla Thunderbird 68.2: Failure to correctly handle null bytes when processing HTML entities resulted in Firefox incorrectly parsing these entities. This could have led to HTML comment text being treated as HTML which could have led to XSS in a web application under certain conditions. It could have also led to HTML entities being masked from filt ...

Mozilla Firefox 70, Mozilla Firefox ESR 68.2 and Mozilla Thunderbird 68.2: Mozilla developers and community members Bob Clary, Jason Kratzer, Aaron Klotz, Iain Ireland, Tyson Smith, Christian Holler, Steve Fink, Honza Bambas, Byron Campen, and Cristian Brindusan reported memory safety bugs present in Firefox 69 and Firefox ESR 68.1. Some of these bugs showed evidence of memory corruption and we pr ...

Mozilla Firefox 70, Mozilla Firefox ESR 68.2, Mozilla Thunderbird 68.2, Google Chrome, Apple iTunes and iCloud: In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early. A subsequent call to code XML_GetCurrentLineNumber/code or codeXML_GetCurrentColumnNumber/code then resulted in a heap-based buffer over-read.

Mozilla Firefox 70 : An object tag with a data URI did not correctly inherit the document's Content Security Policy. This allowed a CSP bypass in a cross-origin frame if the document's policy explicitly allowed codedata:/code URIs.

Mozilla Firefox 70 : A Content-Security-Policy that blocks in-line scripts could be bypassed using an object tag to execute JavaScript in the protected document (cross-site scripting). This is a separate bypass from CVE-2019-17000.

Mozilla Firefox 70 : If codeupgrade-insecure-requests/code was specified in the Content Security Policy, and a link was dragged and dropped from that page, the link was not upgraded to https.

The host is installed with Apple iTunes before 12.10.3 or Apple iCloud before 7.16 and is prone to an information disclosure vulnerability. A flaw is present in the applications, which fail to properly handle an issue in older versions of expat. Successful exploitation could allow attackers to obtain sensitive information via a crafted XML file.

The host is installed with 7 zip through 18.01 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly implement the "Large memory pages" option. Successful exploitation could allow remote attackers to bypass intended access restrictions.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   3140

© SecPod Technologies