Lucene search

K

Maxthon Browser Security Vulnerabilities

cve
cve

CVE-2010-5246

Multiple untrusted search path vulnerabilities in Maxthon Browser 1.6.7.35 and 2.5.15 allow local users to gain privileges via a Trojan horse (1) RSRC32.dll or (2) dwmapi.dll file in the current working directory, as demonstrated by a directory that contains a .html file. NOTE: the provenance of...

6.7AI Score

0.001EPSS

2022-10-03 04:21 PM
16
cve
cve

CVE-2019-16647

Unquoted Search Path in Maxthon 5.1.0 to 5.2.7 Browser for...

7.2CVSS

6.9AI Score

0.001EPSS

2019-10-29 07:15 PM
100
In Wild
cve
cve

CVE-2014-1449

The Maxthon Cloud Browser application before 4.1.6.2000 for Android allows remote attackers to spoof the address bar via crafted JavaScript code that uses the history...

7AI Score

0.002EPSS

2014-12-25 09:59 PM
19
cve
cve

CVE-2009-3018

Maxthon Browser 3.0.0.145 Alpha with Ultramode does not properly block javascript: and data: URIs in Refresh headers in HTTP responses, which allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to (1) injecting a Refresh header that contains a javascript: URI,....

5.6AI Score

0.002EPSS

2009-08-31 04:30 PM
19
cve
cve

CVE-2009-3006

Maxthon Browser 2.5.3.80 UNICODE allows remote attackers to spoof the address bar, via window.open with a relative URI, to show an arbitrary URL on the web site visited by the victim, as demonstrated by a visit to an attacker-controlled web page, which triggers a spoofed login form for the site...

6.9AI Score

0.002EPSS

2009-08-28 03:30 PM
18
cve
cve

CVE-2008-3667

Stack-based buffer overflow in Maxthon Browser 2.0 and earlier allows remote attackers to execute arbitrary code via a long Content-type HTTP...

8.1AI Score

0.676EPSS

2008-08-13 06:41 PM
20