[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 10562 Download | Alert*

Mozilla Firefox 125, Mozilla Firefox ESR 115.10 and Mozilla Thunderbird 115.10.0 : GetBoundName could return the wrong version of an object when JIT optimizations were applied.

Mozilla Firefox 125, Mozilla Firefox ESR 115.10, Mozilla Thunderbird 115.10.0 : In some code patterns the JIT incorrectly optimized switch statements and generated code with out-of-bounds-reads.

Mozilla Firefox 125, Mozilla Firefox ESR 115.10 and Mozilla Thunderbird 115.10.0 : The JIT created incorrect code for arguments in certain cases. This led to potential use-after-free crashes during garbage collection.

Mozilla Firefox 125, Mozilla Firefox ESR 115.10 and Mozilla Thunderbird 115.10.0 : On 32-bit versions there were integer-overflows that led to an out-of-bounds-read that potentially could be triggered by a malformed OpenType font.

Mozilla Firefox 125, Mozilla Firefox ESR 115.10 and Mozilla Thunderbird 115.10.0 : If an AlignedBuffer were assigned to itself, the subsequent self-move could result in an incorrect reference count and later use-after-free.

Mozilla Firefox 125, Mozilla Firefox ESR 115.10 and Mozilla Thunderbird 115.10.0 : Memory safety bug present in Firefox 124, Firefox ESR 115.9. This bug showed evidence of memory corruption and we presume that with enough effort this could have been exploited to run arbitrary code.

The host is installed with Oracle Java SE through 11.0.22, 17.0.10, 21.0.2, or 22.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Networking. Successful exploitation allows attackers to affect integrity.

The host is installed with Oracle Java SE through 11.0.22, 17.0.10, 21.0.2, or 22.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Networking. Successful exploitation allows attackers to affect integrity.

The host is installed with Oracle Java SE through 11.0.22, 17.0.10, 21.0.2, or 22.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Networking. Successful exploitation allows attackers to affect integrity.

The host is installed with Oracle Java SE through 11.0.22, 17.0.10, 21.0.2, or 22.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Networking. Successful exploitation allows attackers to affect integrity.


Pages:      Start    546    547    548    549    550    551    552    553    554    555    556    557    558    559    ..   1056

© SecPod Technologies