Search Results

Showing results for HTML/ScrInject.B!tr

/static/images/icons/epvuln.svg?v=5226 Endpoint Vulnerability
XSS in the HTML Data Processor allows remote attackers to inject arbitrary web script through a crafted "protected" comment [fedora-all]
/static/images/icons/epvuln.svg?v=5226 Endpoint Vulnerability
XSS in the HTML Data Processor allows remote attackers to inject arbitrary web script through a crafted "protected" comment [epel-all]
/static/images/icons/epvuln.svg?v=5226 Endpoint Vulnerability
buffer overflow when input chunk is larger than 2GiB
/static/images/icons/epvuln.svg?v=5226 Endpoint Vulnerability
Out-of-bounds read in mark_line_tr function [fedora-all]
/static/images/icons/epvuln.svg?v=5226 Endpoint Vulnerability
Security researcher Fabin Cuchietti discovered that it was possible to bypass the restriction on JavaScript execution in mail by embedding an with a data: URL within a message. If the victim replie...
/static/images/icons/epvuln.svg?v=5226 Endpoint Vulnerability
Security researcher Fabin Cuchietti discovered that it was possible to bypass the restriction on JavaScript execution in mail by embedding an with a data: URL within a message. If the victim replie...
/static/images/icons/epvuln.svg?v=5226 Endpoint Vulnerability
VUPEN Security, via TippingPoint's Zero Day Initiative, reported a use-after-free within the HTML editor when content script is run by the document.execCommand() function while internal editor ...
/static/images/icons/epvuln.svg?v=5226 Endpoint Vulnerability
VUPEN Security, via TippingPoint's Zero Day Initiative, reported a use-after-free within the HTML editor when content script is run by the document.execCommand() function while internal editor ...
/static/images/icons/epvuln.svg?v=5226 Endpoint Vulnerability
VUPEN Security, via TippingPoint's Zero Day Initiative, reported a use-after-free within the HTML editor when content script is run by the document.execCommand() function while internal editor ...
/static/images/icons/epvuln.svg?v=5226 Endpoint Vulnerability
Security researcher Fabin Cuchietti discovered that it was possible to bypass the restriction on JavaScript execution in mail by embedding an with a data: URL within a message. If the victim replie...