[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15795 Download | Alert*

Mozilla Firefox 102.0 : SVG tags that referenced a same-origin document could have resulted in script execution if attacker input was sanitized via the HTML Sanitizer API. This would have required the attacker to reference a same-origin JavaScript file containing the script to be executed.

Mozilla Firefox 102.0 : Even when an iframe was sandboxed with allow-top-navigation-by-user-activation, if it received a redirect header to an external protocol the browser would process the redirect and prompt the user as appropriate.

Mozilla Firefox 102.0 : The HTML Sanitizer should have sanitized the href attribute of SVG tags; however it incorrectly did not sanitize xlink:href attributes.

Mozilla Firefox 102.0, Mozilla Firefox ESR 91.11, Mozilla Thunderbird 91.11 and Mozilla Thunderbird 102 : If there was a PAC URL set and the server that hosts the PAC was not reachable, OCSP requests would have been blocked, resulting in incorrect error pages being shown.

Mozilla Firefox 102.0 : When downloading an update for an addon, the downloaded addon update's version was not verified to match the version selected from the manifest. If the manifest had been tampered with on the server, an attacker could trick the browser into downgrading the addon to a prior version.

Mozilla Firefox 102.0, Mozilla Firefox ESR 91.11, Mozilla Thunderbird 91.11 and Mozilla Thunderbird 102 : Navigations between XML documents may have led to a use-after-free and potentially exploitable crash.

Mozilla Firefox 102.0, Mozilla Firefox ESR 91.11 : An iframe that was not permitted to run scripts could do so if the user clicked on a javascript: link.

Mozilla Firefox ESR 91.11, Mozilla Thunderbird 91.11 and Mozilla Thunderbird 102.0 : An attacker could have injected CSS into stylesheets accessible via internal URIs, such as resource, and in doing so bypass a page's Content Security Policy.

Mozilla Firefox 101.0 : An attacker could have injected CSS into stylesheets accessible via internal URIs, such as resource:, and in doing so bypass a page's Content Security Policy.

Mozilla Firefox 102.0, Mozilla Firefox ESR 91.11, Mozilla Thunderbird 91.11 and Mozilla Thunderbird 102: If an object prototype was corrupted by an attacker, they would have been able to set undesired attributes on a JavaScript object, leading to privileged code execution.


Pages:      Start    780    781    782    783    784    785    786    787    788    789    790    791    792    793    ..   1579

© SecPod Technologies