75 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. JavaScript alert handling in Prompts in Google Chrome prior to. ![]() 75 allowed a remote attacker to bypass same origin policy via a crafted HTML page. Insufficient policy enforcement in Blink in Google Chrome prior to. 75 allowed a remote attacker to trigger installation of an unwanted extension via a crafted HTML page. Lack of timeout on extension install prompt in Extensions in Google Chrome prior to. 75 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name. Insufficient data validation in filesystem URIs in Google Chrome prior to. 75 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension. Insufficient data validation in Extensions API in Google Chrome prior to. This issue affects: ((OTRS)) Community Edition 5.0.x version 5.0.39 and prior versions 6.0.x version 6.0.24 and. Telegram Desktop through 2.0.1, Telegram through 6.0.1 for Android, and Telegram through 6.0.1 for iOS allow an IDN Homograph attack via Punycode in a public URL or a group chat invitation URL.Īn improper control of parameters allows the spoofing of the from fields of the following screens: AgentTicketCompose, AgentTicketForward, AgentTicketBounce and AgentTicketEmailOutbound. A Remote Code Execution Vulnerability exists in Joomla! vBizz which allows an attacker to execute code remotely. Joomla! vBizz Remote Code Execution Vulnerability. An attacker can redirect a user to a malicious website and launch further attacks. Joomla is prone to a Host Header Injection Vulnerability. ![]() ![]() Joomla Host Header Injection Vulnerability.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |