[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15792 Download | Alert*

Mozilla Firefox 88, Mozilla Firefox ESR 78.10 and Mozilla Thunderbird 78.10: Through complicated navigations with new windows, an HTTP page could have inherited a secure lock icon from an HTTPS page.

Mozilla Firefox 88 : Due to unexpected data type conversions, a use-after-free could have occurred when interacting with the font cache. We presume that with enough effort this could have been exploited to run arbitrary code.

Mozilla Firefox 88 : By utilizing 3D CSS in conjunction with Javascript, content could have been rendered outside the webpage's viewport, resulting in a spoofing attack that could have been used for phishing or other attacks on a user.

Mozilla Firefox 88, Mozilla Firefox ESR 78.10 and Mozilla Thunderbird 78.10: When Responsive Design Mode was enabled, it used references to objects that were previously freed. We presume that with enough effort this could have been exploited to run arbitrary code.

Mozilla Firefox 88, Mozilla Firefox ESR 78.10 and Mozilla Thunderbird 78.10: A WebGL framebuffer was not initialized early enough, resulting in memory corruption and an out of bound write.

Mozilla Thunderbird 78.10: Signatures are written to disk before and read during verification, which might be subject to a race condition when a malicious local process or user is replacing the file.

Mozilla Firefox 85, Mozilla Firefox ESR 78.10, Mozilla Thunderbird 78.10: Further techniques that built on the slipstream research combined with a malicious webpage could have exposed both an internal network's hosts as well as services running on the user's local machine.

Mozilla Thunderbird before 78.9.1: An attacker may perform a DoS attack to prevent a user from sending encrypted email to a correspondent. If an attacker creates a crafted OpenPGP key with a subkey that has an invalid self signature, and the Thunderbird user imports the crafted key, then Thunderbird may try to use the invalid subkey, but the RNP library rejects it from being used, causing encrypti ...

Mozilla Thunderbird before 78.9.1: If a Thunderbird user has previously imported Alice's OpenPGP key, and Alice has extended the validity period of her key, but Alice's updated key has not yet been imported, an attacker may send an email containing a crafted version of Alice's key with an invalid subkey, Thunderbird might subsequently attempt to use the invalid subkey, and will fail to send encryp ...

Mozilla Firefox 87 : Mozilla developers Tyson Smith and Christian Holler reported memory safety bugs present in Firefox 86. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.


Pages:      Start    800    801    802    803    804    805    806    807    808    809    810    811    812    813    ..   1579

© SecPod Technologies