[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

247085

 
 

909

 
 

194218

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15730 Download | Alert*

Mozilla Firefox 124, Mozilla Firefox ESR 115.9, Mozilla Thunderbird 115.9 : NSS was susceptible to a timing side-channel attack when performing RSA decryption. This attack could potentially allow an attacker to recover the private data.

Mozilla Firefox ESR 115.9, Mozilla Thunderbird 115.9 : An unchecked return value in TLS handshake code could have caused a potentially exploitable crash.

Mozilla Firefox 124, Mozilla Firefox ESR 115.9, Mozilla Thunderbird 115.9 : AppendEncodedAttributeValue(), ExtraSpaceNeededForAttrEncoding() and AppendEncodedCharacters() could have experienced integer overflows, causing underallocation of an output buffer leading to an out of bounds write.

Mozilla Firefox 124, Mozilla Firefox ESR 115.9, Mozilla Thunderbird 115.9 : Using a markup injection an attacker could have stolen nonce values. This could have been used to bypass strict content security policies.

Mozilla Firefox 124, Mozilla Firefox ESR 115.9, Mozilla Thunderbird 115.9 : A missing delay on when pointer lock was used could have allowed a malicious page to trick a user into granting permissions.

Mozilla Firefox 124, Mozilla Firefox ESR 115.9, Mozilla Thunderbird 115.9 : If an attacker could find a way to trigger a particular code path in SafeRefPtr, it could have triggered a crash or potentially be leveraged to achieve code execution.

Mozilla Firefox 124, Mozilla Firefox ESR 115.9, Mozilla Thunderbird 115.9 : Memory safety bugs present in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

Mozilla Firefox ESR 115.9, Mozilla Thunderbird 115.9 : To harden ICU against exploitation, the behavior for out-of-memory conditions was changed to crash instead of attempt to continue.

The host is installed with Google Chrome before 122.0.6261.128, or Microsoft Edge before 122.0.2365.92 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 122.0.6261.111, or Microsoft Edge before 122.0.2365.80 and is prone to an out of bounds memory access vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.


Pages:      Start    2    3    4    5    6    7    8    9    10    11    12    13    14    15    ..   1572

© SecPod Technologies