[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15792 Download | Alert*

Mozilla Firefox 89: When a user has already allowed a website to access microphone and camera, disabling camera sharing would not fully prevent the website from re-enabling it without an additional prompt. This was only possible if the website kept recording with the microphone until re-enabling the camera.

Mozilla Thunderbird greater than or equal to 78.8.1 and before 78.10.2: OpenPGP secret keys that were imported using Thunderbird version 78.8.1 up to version 78.10.1 were stored unencrypted on the user's local disk. The master password protection was inactive for those keys. Version 78.10.2 will restore the protection mechanism for newly imported keys, and will automatically protect keys that had ...

Mozilla Thunderbird before 78.10.2: If a MIME encoded email contains an OpenPGP inline signed or encrypted message part, but also contains an additional unprotected part, Thunderbird did not indicate that only parts of the message are protected.

Mozilla Firefox 88.0.1: When Web Render components were destructed, a race condition could have caused undefined behavior, and we presume that with enough effort may have been exploitable to run arbitrary code.

Mozilla Firefox 88 : Mozilla developers and community members Ryan VanderMeulen, Sean Feng, Tyson Smith, Julian Seward, Christian Holler reported memory safety bugs present in Firefox 87. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

Mozilla Firefox 88, Mozilla Firefox ESR 78.10 and Mozilla Thunderbird 78.10: Ports that were written as an integer overflow above the bounds of a 16-bit integer could have bypassed port blocking restrictions when used in the Alt-Svc header.

Mozilla Firefox 88, Mozilla Firefox ESR 78.10 and Mozilla Thunderbird 78.10: When a user clicked on an FTP URL containing encoded newline characters (%0A and %0D), the newlines would have been interpreted as such and allowed arbitrary commands to be sent to the FTP server.

Mozilla Firefox 88 : A compromised content process could have performed session history manipulations it should not have been able to due to testing infrastructure that was not restricted to testing-only configurations.

Mozilla Firefox 88 : A race condition with <code>requestPointerLock()</code> and <code>setTimeout()</code> could have resulted in a user interacting with one tab when they believed they were on a separate tab. In conjunction with certain elements (such as <code><input type="file"></code>) this could have led to an attack where a user was confused about the origin of the webpage and potentially dis ...

Mozilla Firefox 88, Mozilla Firefox ESR 78.10 and Mozilla Thunderbird 78.10: If a Blob URL was loaded through some unusual user interaction, it could have been loaded by the System Principal and granted additional privileges that should not be granted to web content.


Pages:      Start    799    800    801    802    803    804    805    806    807    808    809    810    811    812    ..   1579

© SecPod Technologies