[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15795 Download | Alert*

Mozilla Firefox 74, Mozilla Firefox ESR 68.6 and Mozilla Thunderbird 68.6 : When removing data about an origin whose tab was recently closed, a use-after-free could occur in the Quota manager, resulting in a potentially exploitable crash.

The host is installed with Mozilla Firefox 4.x through 8.0 or Thunderbird 5.0 through 8.0 or SeaMonkey before 2.6 and is prone to use-after-free vulnerability. A flaw is present in the applications, which fail to handle nsHTMLSelectElement when the parent node of the element is no longer active. Successful exploitation could allow attackers to run arbitrary code.

Mozilla Thunderbird 68.5 : When processing a message that contains multiple S/MIME signatures, a bug in the MIME processing code caused a null pointer dereference, leading to an unexploitable crash.

Mozilla Thunderbird 68.5 : If a user saved passwords before Thunderbird 60 and then later set a master password, an unencrypted copy of these passwords is still accessible. This is because the older stored password file was not deleted when the data was copied to a new format starting in Thunderbird 60. The new master password is added only on the new file. This could allow the exposure of stored ...

Mozilla Thunderbird 68.5 : When processing an email message with an ill-formed envelope, Thunderbird could read data from a random memory location.

Mozilla Thunderbird 68.5 : When deriving an identifier for an email message, uninitialized memory was used in addition to the message contents.

Mozilla Firefox 73 : Mozilla developers Jason Kratzer, Tyson Smith, and Christian Holler reported memory safety bugs present in Firefox 72. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

Mozilla Firefox 73, Mozilla Firefox ESR 68.5 and Mozilla Thunderbird 68.5 : Mozilla developers and community members Raul Gurzau, Tyson Smith, Bob Clary, Liz Henry, and Christian Holler reported memory safety bugs present in Firefox 72 and Firefox ESR 68.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run ...

Mozilla Firefox 73, Mozilla Firefox ESR 68.5 : Command line arguments could have been injected during Firefox invocation as a shell handler for certain unsupported file types. This required Firefox to be configured as the default handler for a given file type and for a file downloaded to be opened in a third party application that insufficiently sanitized URL data. In that situation, clicking a li ...

Mozilla Firefox 73, Mozilla Firefox ESR 68.5 and Mozilla Thunderbird 68.5 : If a <code><template></code> tag was used in a <code><select%gt;</code> tag, the parser could be confused and allow JavaScript parsing and execution when it should not be allowed. A site that relied on the browser behaving correctly could suffer a cross-site scripting vulnerability as a result.


Pages:      Start    816    817    818    819    820    821    822    823    824    825    826    827    828    829    ..   1579

© SecPod Technologies