2 results (0.004 seconds)

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

28 Aug 2009 — K-Meleon 1.5.3 allows context-dependent attackers to spoof the address bar, via window.open with a relative URI, to show an arbitrary file: URL after a victim has visited any file: URL, as demonstrated by a visit to a file: document written by the attacker. K-Meleon v1.5.3 permite falsificar la barra de direcciones a atacantes, dependiendo del contexto, a través de window.open con una URI relativa, para que muestre una URL de tipo file: después de que una victima haya visitado ficha URI de tipo file: , como... • http://lostmon.blogspot.com/2009/08/multiple-browsers-fake-url-folder-file.html •

CVSS: 9.8EPSS: 97%CPEs: 32EXPL: 14

01 Jul 2009 — Array index error in the (1) dtoa implementation in dtoa.c (aka pdtoa.c) and the (2) gdtoa (aka new dtoa) implementation in gdtoa/misc.c in libc, as used in multiple operating systems and products including in FreeBSD 6.4 and 7.2, NetBSD 5.0, OpenBSD 4.5, Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4, K-Meleon 1.5.3, SeaMonkey 1.1.8, and other products, allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large precision v... • https://www.exploit-db.com/exploits/10186 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •