[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250363

 
 

909

 
 

196124

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15028 Download | Alert*

Mozilla Firefox 69, Mozilla Firefox ESR 68.1 : A vulnerability exists in WebRTC where malicious web content can use probing techniques on the <code>getUserMedia</code> API using constraints to reveal device properties of cameras on the system without triggering a user prompt or notification. This allows for the potential fingerprinting of users.

Mozilla Firefox 69, Mozilla Firefox ESR 68.1 : A type confusion vulnerability exists in Spidermonkey, which results in a non-exploitable crash.

Mozilla Firefox 69, Mozilla Firefox ESR 68.1 : Logging-related command line parameters are not properly sanitized when Firefox is launched by another program, such as when a user clicks on malicious links in a chat application. This can be used to write a log file to an arbitrary location such as the Windows 'Startup' folder.

Mozilla Firefox 69, Mozilla Firefox ESR 68.1 and Mozilla Thunderbird 68.1 : It is possible to delete an IndexedDB key value and subsequently try to extract it during conversion. This results in a use-after-free and a potentially exploitable crash.

Mozilla Firefox 69, Mozilla Firefox ESR 68.1 : The Firefox installer allows Firefox to be installed to a custom user writable location, leaving it unprotected from manipulation by unprivileged users or malware. If the Mozilla Maintenance Service is manipulated to update this unprotected location and the updated maintenance service in the unprotected location has been altered, the altered maintenan ...

Mozilla Firefox 69, Mozilla Firefox ESR 68.1 : Given a compromised sandboxed content process due to a separate vulnerability, it is possible to escape that sandbox by loading <code>accounts.firefox.com</code> in that process and forcing a log-in to a malicious Firefox Sync account. Preference settings that disable the sandbox are then synchronized to the local machine and the compromised browser w ...

The host is installed with Python 2.x through 2.7.16, 3.x through 3.5.7, 3.6.x through 3.6.9 or 3.7.x through 3.7.4 and is prone to a security bypass vulnerability. The flaw is present in the application, which fails to properly handle an issue in parsing email addresses. Successful exploitation allows attackers to trick the application into accepting an email address that should be denied.

The host is installed with Python 2.x through 2.7.16, 3.x through 3.6.9 or 3.7.x through 3.7.4 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle untrusted input with set_server_title. Successful exploitation allows attackers to execute arbitrary JavaScript.

The host is installed with Python before 2.6.8, 2.7.x before 2.7.3, 3.2.x before 3.2.3 or 3.x through 3.1.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle crafted input to an application that maintains a hash table. Successful exploitation could allow attackers to crash the service.

The host is installed with Python before before 2.6.8, 2.7.x before 2.7.3, 3.2.x before 3.2.3 or 3.x through 3.1.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle crafted XML-RPC POST. Successful exploitation could allow attackers to crash the service.


Pages:      Start    11    12    13    14    15    16    17    18    19    20    21    22    23    24    ..   1502

© SecPod Technologies