[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 196303 Download | Alert*

Mozilla Firefox 100 : Mozilla developers Gabriele Svelto, Randell Jesup and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 99. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

Mozilla Firefox 100, Mozilla Firefox ESR 91.9 or Mozilla Thunderbird 91.9 : Mozilla developers Andrew McCreight, Gabriele Svelto, Tom Ritter and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 99 and Firefox ESR 91.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

Mozilla Firefox 100, Mozilla Firefox ESR 91.9 or Mozilla Thunderbird 91.9 : Firefox behaved slightly differently for already known resources when loading CSS resources involving CSS variables. This could have been used to probe the browser history.

Mozilla Firefox 100 : The Performance API did not properly hide the fact whether a request cross-origin resource has observed redirects.

Mozilla Firefox 100, Mozilla Firefox ESR 91.9 or Mozilla Thunderbird 91.9 : When reusing existing popups Firefox would have allowed them to cover the fullscreen notification UI, which could have enabled browser spoofing attacks.

Mozilla Firefox 100, Mozilla Firefox ESR 91.9 or Mozilla Thunderbird 91.9 : Requests initiated through reader mode did not properly omit cookies with a SameSite attribute.

Mozilla Firefox 100, Mozilla Firefox ESR 91.9 or Mozilla Thunderbird 91.9 : Firefox did not properly protect against top-level navigations for an iframe sandbox with a policy relaxed through a keyword like 'allow-top-navigation-by-user-activation'.

Mozilla Firefox 100, Mozilla Firefox ESR 91.9 or Mozilla Thunderbird 91.9 : Documents in deeply-nested cross-origin browsing contexts could have obtained permissions granted to the top-level origin, bypassing the existing prompt and wrongfully inheriting the top-level permissions.

The host is missing a high severity security update according to the Mozilla advisory MFSA2022-16 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows an attacker to cause unspecified impact.

The host is missing a high severity security update according to the Mozilla advisory MFSA2022-17 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows an attacker to cause unspecified impact.


Pages:      Start    8925    8926    8927    8928    8929    8930    8931    8932    8933    8934    8935    8936    8937    8938    ..   19630

© SecPod Technologies