[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256148

 
 

909

 
 

199106

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 198221 Download | Alert*

The host is missing a high severity security update according to the Mozilla advisory MFSA2022-21 and is prone to multiple vulnerabilities. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows an attacker to have unspecified impact.

Mozilla Firefox 101.0, Mozilla Firefox ESR 91.10.0 or Mozilla Thunderbird 91.0.0: A malicious webpage could have caused an out-of-bounds write in WebGL, leading to memory corruption and a potentially exploitable crash.

Multiple security issues were discovered in Thunderbird, which could result in denial of service or the execution of arbitrary code.

This update for MozillaFirefox fixes the following issues: Firefox Extended Support Release 91.10.0 ESR - CVE-2022-31736: Cross-Origin resource"s length leaked - CVE-2022-31737: Heap buffer overflow in WebGL - CVE-2022-31738: Browser window spoof using fullscreen mode - CVE-2022-31739: Attacker-influenced path traversal when saving downloaded files - CVE-2022-31740: Register allocation problem in ...

This update for MozillaFirefox fixes the following issues: Firefox Extended Support Release 91.10.0 ESR - CVE-2022-31736: Cross-Origin resource"s length leaked - CVE-2022-31737: Heap buffer overflow in WebGL - CVE-2022-31738: Browser window spoof using fullscreen mode - CVE-2022-31739: Attacker-influenced path traversal when saving downloaded files - CVE-2022-31740: Register allocation problem in ...

This update for MozillaFirefox fixes the following issues: Firefox Extended Support Release 91.10.0 ESR - CVE-2022-31736: Cross-Origin resource"s length leaked - CVE-2022-31737: Heap buffer overflow in WebGL - CVE-2022-31738: Browser window spoof using fullscreen mode - CVE-2022-31739: Attacker-influenced path traversal when saving downloaded files - CVE-2022-31740: Register allocation problem in ...

This update for MozillaFirefox fixes the following issues: Firefox Extended Support Release 91.10.0 ESR - CVE-2022-31736: Cross-Origin resource"s length leaked - CVE-2022-31737: Heap buffer overflow in WebGL - CVE-2022-31738: Browser window spoof using fullscreen mode - CVE-2022-31739: Attacker-influenced path traversal when saving downloaded files - CVE-2022-31740: Register allocation problem in ...

Security Fix: Mozilla: Braille space character caused incorrect sender email to be shown for a digitally signed email Mozilla: Cross-Origin resources length leaked Mozilla: Heap buffer overflow in WebGL Mozilla: Browser window spoof using fullscreen mode Mozilla: Register allocation problem in WASM on arm64 Mozilla: Uninitialized variable leads to invalid memory read Mozilla: Memory safety b ...

Security Fix: Mozilla: Cross-Origin resource's length leaked Mozilla: Heap buffer overflow in WebGL Mozilla: Browser window spoof using fullscreen mode Mozilla: Register allocation problem in WASM on arm64 Mozilla: Uninitialized variable leads to invalid memory read Mozilla: Memory safety bugs fixed in Firefox 101 and Firefox ESR 91.10 Mozilla: Querying a WebAuthn token with a large number o ...

A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes the issue of when displaying the sender of an email, and the sender name contained the Braille Pattern Blank space character multiple times, Thunderbird displays all spaces. This flaw allows an attacker to send an email message with the attacker's digital signature that shows an arbitrary sender email address chosen by ...


Pages:      Start    9221    9222    9223    9224    9225    9226    9227    9228    9229    9230    9231    9232    9233    9234    ..   19822

© SecPod Technologies