[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 17014 Download | Alert*

Mozilla Firefox 125, Mozilla Firefox ESR 115.10 : On 32-bit versions there were integer-overflows that led to an out-of-bounds-read that potentially could be triggered by a malformed OpenType font.

Mozilla Firefox 125 : It was possible to mutate a JavaScript object so that the JIT could crash while tracing it.

Mozilla Firefox 125, Mozilla Firefox ESR 115.10 : The JIT created incorrect code for arguments in certain cases. This led to potential use-after-free crashes during garbage collection.

Mozilla Firefox 125 : A use-after-free could occur during WASM execution if garbage collection ran during the creation of an array.

Mozilla Firefox 125 : In certain cases the JIT incorrectly optimized MSubstr operations, which led to out-of-bounds reads.

Mozilla Firefox 125, Mozilla Firefox ESR 115.10 : In some code patterns the JIT incorrectly optimized switch statements and generated code with out-of-bounds-reads.

Mozilla Firefox 125 : A use-after-free could result if a JavaScript realm was in the process of being initialized when a garbage collection started.

Mozilla Firefox 125, Mozilla Firefox ESR 115.10 : GetBoundName could return the wrong version of an object when JIT optimizations were applied.

Mozilla Firefox 125, Mozilla Firefox ESR 115.10 : There was no limit to the number of HTTP/2 CONTINUATION frames that would be processed. A server could abuse this to create an Out of Memory condition in the browser.

Mozilla Firefox 124, Mozilla Firefox ESR 115.10 : The permission prompt input delay could have expired while the window is not in focus, which made the prompt vulnerable to clickjacking by malicious websites.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1701

© SecPod Technologies