[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31090 Download | Alert*

Mozilla Firefox 125, Mozilla Firefox ESR 115.10 : The JIT created incorrect code for arguments in certain cases. This led to potential use-after-free crashes during garbage collection.

Mozilla Firefox 125 : A use-after-free could occur during WASM execution if garbage collection ran during the creation of an array.

Mozilla Firefox 125 : In certain cases the JIT incorrectly optimized MSubstr operations, which led to out-of-bounds reads.

Mozilla Firefox 125, Mozilla Firefox ESR 115.10 : In some code patterns the JIT incorrectly optimized switch statements and generated code with out-of-bounds-reads.

Mozilla Firefox 125 : A use-after-free could result if a JavaScript realm was in the process of being initialized when a garbage collection started.

Mozilla Firefox 125, Mozilla Firefox ESR 115.10 : GetBoundName could return the wrong version of an object when JIT optimizations were applied.

Mozilla Firefox 125, Mozilla Firefox ESR 115.10 : There was no limit to the number of HTTP/2 CONTINUATION frames that would be processed. A server could abuse this to create an Out of Memory condition in the browser.

Mozilla Firefox 124 and Mozilla Firefox ESR 115.10 : The permission prompt input delay could have expired while the window is not in focus, which made the prompt vulnerable to clickjacking by malicious websites.

Remote Desktop Client Remote Code Execution Vulnerability. In the case of a Remote Desktop connection, an attacker with control of a Remote Desktop Server could trigger a remote code execution (RCE) on the RDP client machine when a victim connects to the attacking server with the vulnerable Remote Desktop Client.

Windows Hyper-V Denial of Service Vulnerability. Successful exploitation of this vulnerability could allow a Hyper-V guest to affect the functionality of the Hyper-V host. Where the attack vector metric is Adjacent (A), this represents virtual machines connected via a Hyper-V Network Virtualization (HNV) logical network. This configuration forms an isolation boundary where the virtual machines wit ...


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   3108

© SecPod Technologies