[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 194770 Download | Alert*

Mozilla Firefox 88 : By utilizing 3D CSS in conjunction with Javascript, content could have been rendered outside the webpage's viewport, resulting in a spoofing attack that could have been used for phishing or other attacks on a user.

Mozilla Firefox 88, Mozilla Firefox ESR 78.10 and Mozilla Thunderbird 78.10: When Responsive Design Mode was enabled, it used references to objects that were previously freed. We presume that with enough effort this could have been exploited to run arbitrary code.

Mozilla Firefox 88, Mozilla Firefox ESR 78.10 and Mozilla Thunderbird 78.10: A WebGL framebuffer was not initialized early enough, resulting in memory corruption and an out of bound write.

Mozilla Thunderbird 78.10: Signatures are written to disk before and read during verification, which might be subject to a race condition when a malicious local process or user is replacing the file.

Mozilla Firefox 85, Mozilla Firefox ESR 78.10, Mozilla Thunderbird 78.10: Further techniques that built on the slipstream research combined with a malicious webpage could have exposed both an internal network's hosts as well as services running on the user's local machine.

The host is missing a high severity security update according to the Mozilla advisory MFSA2021-14 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows an attacker to cause unspecified impact.

The host is missing a high severity security update according to the Mozilla advisory MFSA2021-15 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows an attacker to cause unspecified impact.

The host is missing a high severity security update according to the Mozilla advisory MFSA2021-16 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows an attacker to cause unspecified impact.

The host is missing a moderate security update according to Mozilla advisory, MFSA2021-13. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle a unknown vector. Successful exploitation could allow an attacker to encrypt email and disable sending of encrypted messages.

[78.9.1-1.0.1] - Replaced thunderbird-redhat-default-prefs.js with thunderbird-oracle-default-prefs.js [78.9.1-1] - Update to 78.9.1


Pages:      Start    8664    8665    8666    8667    8668    8669    8670    8671    8672    8673    8674    8675    8676    8677    ..   19476

© SecPod Technologies