[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249622

 
 

909

 
 

195521

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 17059 Download | Alert*

Mozilla Thunderbird 60.5 : A use-after-free vulnerability can occur while playing a sound notification in Thunderbird. The memory storing the sound data is immediately freed, although the sound is still being played asynchronously, leading to a potentially exploitable crash.

Mozilla Thunderbird 60.5 : A crash can occur when processing a crafted S/MIME message or an XPI package containing a crafted signature. This can be used as a denial-of-service (DOS) attack because Thunderbird reopens the last seen message on restart, triggering the crash again.

Mozilla Thunderbird 91.3 : Thunderbird versions prior to 91.3.0 are vulnerable to the heap overflow described in CVE-2021-43527 when processing S/MIME messages. Thunderbird versions 91.3.0 and later will not call the vulnerable code when processing S/MIME messages that contain certificates with DER-encoded DSA or RSA-PSS signatures.

Mozilla Firefox 111.0, Mozilla Firefox ESR 102.9 and Mozilla Thunderbird 102.9 : When accessing throttled streams, the count of available bytes needed to be checked in the calling function to be within bounds. This may have lead future code to be incorrect and vulnerable.

Mozilla Firefox 111.0, Mozilla Firefox ESR 102.9 and Mozilla Thunderbird 102.9 : While implementing AudioWorklets, some code may have casted one type to another, invalid, dynamic type. This could have led to a potentially exploitable crash.

Mozilla Firefox 111.0, Mozilla Firefox ESR 102.9 and Mozilla Thunderbird 102.9 : Dragging a URL from a cross-origin iframe that was removed during the drag could have led to user confusion and website spoofing attacks.

Mozilla Firefox 111.0, Mozilla Firefox ESR 102.9 and Mozilla Thunderbird 102.9 : Mozilla developers Timothy Nikkel, Andrew McCreight, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 110 and Firefox ESR 102.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

Mozilla Thunderbird 102.9.1: Thunderbird users who use the Matrix chat protocol were vulnerable to a denial-of-service attack.

Mozilla Thunderbird 102.7.1: he host is installed with Mozilla Thunderbird 68.x before 102.7.1 and is prone to an improper certificate validation vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows an attacker to make the Mail signed with a revoked certificate to be displayed as having a valid signature.

Mozilla Firefox ESR 78.9 and Mozilla Thunderbird 78.9: An out of date graphics library (Angle) likely contained vulnerabilities that could potentially be exploited.


Pages:      Start    1074    1075    1076    1077    1078    1079    1080    1081    1082    1083    1084    1085    1086    1087    ..   1705

© SecPod Technologies