[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 193578 Download | Alert*

Mozilla Firefox 125, Mozilla Firefox ESR 115.10 : In some code patterns the JIT incorrectly optimized switch statements and generated code with out-of-bounds-reads.

Mozilla Firefox 125 : A use-after-free could result if a JavaScript realm was in the process of being initialized when a garbage collection started.

Mozilla Firefox 125, Mozilla Firefox ESR 115.10 : GetBoundName could return the wrong version of an object when JIT optimizations were applied.

Mozilla Firefox 125, Mozilla Firefox ESR 115.10 : There was no limit to the number of HTTP/2 CONTINUATION frames that would be processed. A server could abuse this to create an Out of Memory condition in the browser.

The host is missing a high security update according to the Mozilla advisory MFSA2024-19 and is prone to multiple vulnerabilities. A flaw is present in the application, which fails to properly handle various components. successful exploitation allows attacker to cause multiple impact.

The host is missing a high security update according to the Mozilla advisory MFSA2024-18 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle various components. Successful exploitation allows attacker to cause multiple impact.

Updates available for Opera Browser.

Updates available for PuTTY.

Remote Desktop Client Remote Code Execution Vulnerability. In the case of a Remote Desktop connection, an attacker with control of a Remote Desktop Server could trigger a remote code execution (RCE) on the RDP client machine when a victim connects to the attacking server with the vulnerable Remote Desktop Client.

The host is missing a critical security update for KB5027215


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   19357

© SecPod Technologies