[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15027 Download | Alert*

Mozilla Firefox 117, Mozilla Firefox ESR 115.2.0, Mozilla Thunderbird 102.15, Mozilla Thunderbird 115.2 : Excel code.xll add-in files did not have a blocklist entry in Firefox's executable blocklist which allowed them to be downloaded without any warning of their potential harm.

Mozilla Firefox 117, Mozilla Firefox ESR 115.2.0, Mozilla Thunderbird 115.2 : When checking if the Browsing Context had been discarded in codeHttpBaseChannel , if the load group was not available then it was assumed to have already been discarded which was not always the case for private channels after the private session had ended.

Mozilla Firefox 117, Mozilla Firefox ESR 115.2.0, Mozilla Thunderbird 102.15, Mozilla Thunderbird 115.2 : Memory safety bugs present in Firefox 116, Firefox ESR 102.14, Firefox ESR 115.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

Mozilla Firefox 117, Mozilla Firefox ESR 115.2.0, Mozilla Thunderbird 115.2 : Memory safety bugs present in Firefox 116, Firefox ESR 115.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

Mozilla Firefox 118 Mozilla Firefox ESR 115.3 : A compromised content process could have provided malicious data to code FilterNodeD2D1code resulting in an out-of-bounds write, leading to a potentially exploitable crash in a privileged process.

Mozilla Firefox 118 Mozilla Firefox ESR 115.3 : A compromised content process could have provided malicious data in a code PathRecording code resulting in an out-of-bounds write, leading to a potentially exploitable crash in a privileged process.

Mozilla Firefox 118 : In canvas rendering, a compromised content process could have caused a surface to change unexpectedly, leading to a memory leak of a privileged process. This memory leak could be used to effect a sandbox escape if the correct data was leaked.

Mozilla Firefox 118 Mozilla Firefox ESR 115.3 : During Ion compilation, a Garbage Collection could have resulted in a use-after-free condition, allowing an attacker to write two NUL bytes, and cause a potentially exploitable crash.

Mozilla Firefox 118 : A hashtable in the Ion Engine could have been mutated while there was a live interior reference, leading to a potential use-after-free and exploitable crash.

Mozilla Firefox 118 : In a non-standard configuration of Firefox, an integer overflow could have occurred based on network traffic (possibly under influence of a local unprivileged webpage), leading to an out-of-bounds write to privileged process memory.


Pages:      Start    12    13    14    15    16    17    18    19    20    21    22    23    24    25    ..   1502

© SecPod Technologies