[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

251782

 
 

909

 
 

196543

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 195805 Download | Alert*

Mozilla Firefox 78 : When the Windows DLL "webauthn.dll" was missing from the Operating System, and a malicious one was placed in a folder in the user's %PATH%, Firefox may have loaded the DLL, leading to arbitrary code execution.

Mozilla Firefox 78 : In non-standard configurations, a JPEG image created by JavaScript could have caused an internal variable to overflow, resulting in an out of bounds write, memory corruption, and a potentially exploitable crash.

Mozilla Firefox 78, Mozilla Firefox ESR 68.10 and Mozilla Thunderbird 68.10: When performing add-on updates, certificate chains terminating in non-built-in-roots were rejected (even if they were legitimately added by an administrator.) This could have caused add-ons to become out-of-date silently without notification to the user.

Mozilla Firefox 78, Mozilla Firefox ESR 68.10 and Mozilla Thunderbird 68.10: When trying to connect to a STUN server, a race condition could have caused a use-after-free of a pointer, leading to memory corruption and a potentially exploitable crash.

Mozilla Firefox 78, Mozilla Firefox ESR 68.10 and Mozilla Thunderbird 68.10: When processing callbacks that occurred during window flushing in the parent process, the associated window may die; causing a use-after-free condition. This could have led to memory corruption and a potentially exploitable crash.

Mozilla Firefox 78, Mozilla Firefox ESR 68.10 and Mozilla Thunderbird 68.10: Manipulating individual parts of a URL object could have caused an out-of-bounds read, leaking process memory to malicious JavaScript.

Mozilla Firefox 78, Mozilla Firefox ESR 68.10 and Mozilla Thunderbird 68.10: Due to confusion about ValueTags on JavaScript Objects, an object may pass through the type barrier, resulting in memory corruption and a potentially exploitable crash.

Mozilla Firefox 78 : A <code>VideoStreamEncoder</code> may have been freed in a race condition with <code>VideoBroadcaster::AddOrUpdateSink</code>, resulting in a use-after-free, memory corruption, and a potentially exploitable crash.

Mozilla Firefox 78 : When <code>%2F</code> was present in a manifest URL, Firefox's AppCache behavior may have become confused and allowed a manifest to be served from a subdirectory. This could cause the appcache to be used to service requests for the top level directory.

Mozilla Firefox 78 : During RSA key generation, bignum implementations used a variation of the Binary Extended Euclidean Algorithm which entailed significantly input-dependent flow. This allowed an attacker able to perform electromagnetic-based side channel attacks to record traces leading to the recovery of the secret primes. <br />We would like to thank Sohaib ul Hassan for contributing a fix fo ...


Pages:      Start    8905    8906    8907    8908    8909    8910    8911    8912    8913    8914    8915    8916    8917    8918    ..   19580

© SecPod Technologies