[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

251139

 
 

909

 
 

196159

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 195421 Download | Alert*

Mozilla Thunderbird greater than or equal to 78.8.1 and before 78.10.2: OpenPGP secret keys that were imported using Thunderbird version 78.8.1 up to version 78.10.1 were stored unencrypted on the user's local disk. The master password protection was inactive for those keys. Version 78.10.2 will restore the protection mechanism for newly imported keys, and will automatically protect keys that had ...

The host is missing a moderate severity security update according to the Mozilla advisory MFSA2021-22 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows an attacker to have unspecified impact

Mozilla Thunderbird before 78.10.2: If a MIME encoded email contains an OpenPGP inline signed or encrypted message part, but also contains an additional unprotected part, Thunderbird did not indicate that only parts of the message are protected.

firefox: Mozilla Open Source web browser Firefox could be made to crash or run programs as your login if it opened a malicious website.

Mozilla Firefox 88.0.1: When Web Render components were destructed, a race condition could have caused undefined behavior, and we presume that with enough effort may have been exploitable to run arbitrary code.

The host is missing a critical security update according to the Mozilla advisory MFSA2021-20 and is prone to a race condition vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows an attacker to run arbitrary code.

Mozilla Firefox 88 : Mozilla developers and community members Ryan VanderMeulen, Sean Feng, Tyson Smith, Julian Seward, Christian Holler reported memory safety bugs present in Firefox 87. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

Mozilla Firefox 88, Mozilla Firefox ESR 78.10 and Mozilla Thunderbird 78.10: Ports that were written as an integer overflow above the bounds of a 16-bit integer could have bypassed port blocking restrictions when used in the Alt-Svc header.

Mozilla Firefox 88, Mozilla Firefox ESR 78.10 and Mozilla Thunderbird 78.10: When a user clicked on an FTP URL containing encoded newline characters (%0A and %0D), the newlines would have been interpreted as such and allowed arbitrary commands to be sent to the FTP server.

Mozilla Firefox 88 : A compromised content process could have performed session history manipulations it should not have been able to due to testing infrastructure that was not restricted to testing-only configurations.


Pages:      Start    8766    8767    8768    8769    8770    8771    8772    8773    8774    8775    8776    8777    8778    8779    ..   19542

© SecPod Technologies