![]() UniversalXPConnect privileges and possibly execute code or obtainĪ cross-site scripting vulnerability allows remote attackers to ![]() Scripts with the UniversalBrowserRead privilege could gain Privileges via a specially crafted PAC script. Remote Proxy AutoConfig (PAC) servers could execute code with elevated Specially crafted Javascript allows remote attackers to execute Remote attackers to execute arbitrary code. Multiple integer overflows in the Javascript engine might allow The Javascript engine might allow remote attackers to execute Prevent any trouble by disabling Javascript. This problem will be corrected with the next update. The browser engine showing evidence of memory corruption which mayĪlso lead to the execution of arbitrary code. Mozilla team members discovered several crashes during testing of Vulnerabilities and Exposures project identifies the following Several security related problems have been discovered in Mozilla andĭerived products such as Mozilla Thunderbird. Regression that led to a dysfunctional attachment panel which warrantsĪ correction to fix this issue. The latest security updates of Mozilla Thunderbird introduced a Debian Security Advisory DSA-1159-2 mozilla-thunderbird - several vulnerabilities Date Reported: Affected Packages: mozilla-thunderbird Vulnerable: Yes Security database references: In the Bugtraq database (at SecurityFocus): BugTraq ID 18228, BugTraq ID 19181.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |