Improper authorization process handling in WebExtensions can be exploited to gain privileges.Vulnerability related to the browser does not warn users when opening executable files with the SettingContent-ms extension.Vulnerability related to the PerformanceNavigationTiming method can be exploited to bypass Spectre mitigations.Out-of-bounds read vulnerability in QCMS can be exploited remotely via specially designed website to obtain sensitive information.Vulnerability in IPC sandbox security policy can be exploited remotely via specially designed website to obtain sensitive information.incorrect requests handling in NPAPI plugins can be exploited remotely via specially designed website to obtain sensitive information.Use-after-free vulnerability occurring in moving DOM nodes between documents can be exploited remotely via specially designed website to cause denial of service.Integer overflow vulnerability in SSSE3 scaler can be exploited remotely via specially designed website to cause denial of service.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |