opkgirl.blogg.se

Mozilla firefox esr 45.5.1
Mozilla firefox esr 45.5.1









mozilla firefox esr 45.5.1 mozilla firefox esr 45.5.1

The LABEL coder in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allows remote attackers to read arbitrary files via a crafted image. The (1) HTTP and (2) FTP coders in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allow remote attackers to conduct server-side request forgery (SSRF) attacks via a crafted image. The MSL coder in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allows remote attackers to move arbitrary files via a crafted image. Mercurial before 3.7.3 allows remote attackers to execute arbitrary code via a crafted name when converting a Git repository.ġ0 Ubuntu Linux, Imagemagick, Enterprise Linux Desktop and 7 more Information can be changed soon.6 Debian, Fedoraproject, Mercurial and 3 moreġ4 Debian Linux, Fedora, Mercurial and 11 more

mozilla firefox esr 45.5.1

NB: At this moment Mozilla just reserved CVE numbers for these vulnerabilities. NB: This vulnerability have no public CVSS rating so rating can be changed by the time. Vulnerability (8) does not affect users, who have enabled e10s.

  • Memory safety bugs can be exploited to run arbitrary code.
  • Due to improper validation or origin of incoming events received by Pocket extension, malicious users can fire events, inject code and commands.
  • Improperly sanitized Data from Pocket Server before execution can result in the possibility of HTML injection and access to Pocket’s messaging API.
  • An error occuring while in EnumerateDocuments while adding/removing files can be exploited remotely and possibly cause denial of service.
  • This can performed to obtain sensitive information (for example, usernames embedded in JavaScript code)
  • Malicious users can use a JavaScript Map/Set timing attack to find out whether an atom is used in specific contexts by another compartment or zone.
  • An unknown vulnerability can be exploited remotely via crafted SVG images and use of data: URLs to bypass security restrictions and obtain sensitive information.
  • Use-after-free vulnerability in Editor while performing manipulations with DOM subtrees can be exploited remotely and possibly cause denial of service.
  • Memory corruption while using WebGL functions containing vector constructor with a varying array within libGLES can be exploited remotely and possibly cause denial of service.
  • An unknown vulnerability can be exploited remotely via marquee tags to bypass security restrictions and allow inline JavaScript.
  • Malicious users can exploit these vulnerabilities to bypass security restrictions, obtain sensitive information, execute arbitrary code, possibly cause denial of service, gain priveleges or make code injections.īelow is a complete list of vulnerabilities:

    mozilla firefox esr 45.5.1

    Multiple serious vulnerabilities have been found in Mozilla Firefox ESR.











    Mozilla firefox esr 45.5.1