![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.2.1.2025.14 |
Kategorie: | General |
Titel: | Mozilla Firefox Security Advisory (MFSA2025-14) - Linux |
Zusammenfassung: | This host is missing a security update for Mozilla Firefox. |
Beschreibung: | Summary: This host is missing a security update for Mozilla Firefox. Vulnerability Insight: CVE-2025-1931: Use-after-free in WebTransportChild It was possible to cause a use-after-free in the content process side of a WebTransport connection, leading to a potentially exploitable crash. CVE-2025-1932: Inconsistent comparator in XSLT sorting led to out-of-bounds access An inconsistent comparator in xslt/txNodeSorter could have resulted in potentially exploitable out-of-bounds access. Only affected version 122 and later. CVE-2025-1933: JIT corruption of WASM i32 return values on 64-bit CPUs On 64-bit CPUs, when the JIT compiles WASM i32 return values they can pick up bits from left over memory. This can potentially cause them to be treated as a different type. CVE-2025-1934: Unexpected GC during RegExp bailout processing It was possible to interrupt the processing of a RegExp bailout and run additional JavaScript, potentially triggering garbage collection when the engine was not expecting it. CVE-2025-1942: Disclosure of uninitialized memory when .toUpperCase() causes string to get longer When String.toUpperCase() caused a string to get longer it was possible for uninitialized memory to be incorporated into the result string CVE-2025-1935: Clickjacking the registerProtocolHandler info-bar A web page could trick a user into setting that site as the default handler for a custom URL protocol. CVE-2025-1936: Adding %00 and a fake extension to a jar: URL changed the interpretation of the contents jar: URLs retrieve local file ... [Please see the references for more information on the vulnerabilities] Affected Software/OS: Firefox version(s) below 136. Solution: The vendor has released an update. Please see the reference(s) for more information. CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2025-1931 Common Vulnerability Exposure (CVE) ID: CVE-2025-1932 Common Vulnerability Exposure (CVE) ID: CVE-2025-1933 Common Vulnerability Exposure (CVE) ID: CVE-2025-1934 Common Vulnerability Exposure (CVE) ID: CVE-2025-1935 Common Vulnerability Exposure (CVE) ID: CVE-2025-1936 Common Vulnerability Exposure (CVE) ID: CVE-2025-1937 Common Vulnerability Exposure (CVE) ID: CVE-2025-1938 Common Vulnerability Exposure (CVE) ID: CVE-2025-1942 Common Vulnerability Exposure (CVE) ID: CVE-2025-1943 |
Copyright | Copyright (C) 2025 Greenbone AG |
Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |