[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 196303 Download | Alert*

Mozilla Firefox 101.0, Mozilla Firefox ESR 91.10.0 or Mozilla Thunderbird 91.0.0: An attacker could have exploited a timing attack by sending a large number of allowCredential entries and detecting the difference between invalid key handles and cross-origin key handles. This could have led to cross-origin account linking in violation of WebAuthn goals.

Mozilla Firefox 101.0, Mozilla Firefox ESR 91.10.0 or Mozilla Thunderbird 91.0.0: A crafted CMS message could have been processed incorrectly, leading to an invalid memory read, and potentially further memory corruption.

This update for mozilla-nss fixes the following issues: Mozilla NSS 3.68.4 * CVE-2022-31741: Initialize pointers passed to NSS_CMSDigestContext_FinishMultiple

This update for mozilla-nss fixes the following issues: Various FIPS 140-3 related fixes were backported from SUSE Linux Enterprise 15 SP4: - Makes the PBKDF known answer test compliant with NIST SP800-132. - FIPS: Add on-demand integrity tests through sftk_FIPSRepeatIntegrityCheck . - FIPS: mark algorithms as approved/non-approved according to security policy . - FIPS: remove hard disabling of un ...

This update for mozilla-nss fixes the following issues: Various FIPS 140-3 related fixes were backported from SUSE Linux Enterprise 15 SP4: - Makes the PBKDF known answer test compliant with NIST SP800-132. - FIPS: Add on-demand integrity tests through sftk_FIPSRepeatIntegrityCheck . - FIPS: mark algorithms as approved/non-approved according to security policy . - FIPS: remove hard disabling of un ...

This update for mozilla-nss fixes the following issues: Various FIPS 140-3 related fixes were backported from SUSE Linux Enterprise 15 SP4: - Makes the PBKDF known answer test compliant with NIST SP800-132. - FIPS: Add on-demand integrity tests through sftk_FIPSRepeatIntegrityCheck . - FIPS: mark algorithms as approved/non-approved according to security policy . - FIPS: remove hard disabling of un ...

Mozilla Firefox 101.0, Mozilla Firefox ESR 91.10.0 or Mozilla Thunderbird 91.0.0: On arm64, WASM code could have resulted in incorrect assembly generation leading to a register allocation problem, and a potentially exploitable crash.

mozjs91: SpiderMonkey JavaScript library Several security issues were fixed in SpiderMonkey JavaScript Library.

Mozilla Firefox 101.0, Mozilla Firefox ESR 91.10.0 or Mozilla Thunderbird 91.0.0: When exiting fullscreen mode, an iframe could have confused the browser about the current state of fullscreen, resulting in potential user confusion or spoofing attacks.

The host is missing a high severity security update according to the Mozilla advisory MFSA2022-22 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows an attacker to have unspecified impact.


Pages:      Start    8913    8914    8915    8916    8917    8918    8919    8920    8921    8922    8923    8924    8925    8926    ..   19630

© SecPod Technologies