
Thunderbird Improper Check for Certificate Revocation Vulnerability Fixed by 102.7.1 Google Chrome Multiple Vulnerabilities Fixed by 1.119/.120 OpenSSH Multiple Vulnerabilities Fixed by 9.2 Mozilla Firefox Multiple Vulnerabilities Fixed by ESR 102.8 and 110 Mozilla Thunderbird User Interface Denial of Service Vulnerability Fixed by 102.8ĬURL Multiple Vulnerabilities Fixed by 7.88.0

Thunderbird versions prior to 91.3.0 are vulnerable to the heap overflow described in CVE-2021-43527 when processing S/MIME messages
#WATERFOX DOWNLOAD 40.0.3 FREE#
Use after free in DevTools in Google Chrome prior to 1.64 allowed a remote attacker who had convienced the user to engage in direct UI interaction to potentially exploit heap corruption via a crafted HTML page Use after free in Swiftshader in Google Chrome prior to 1.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page Type confusion in CSS in Google Chrome prior to 1.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page Type confusion in V8 in Google Chrome prior to 1.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page Use after free in WebRTC in Google Chrome prior to 1.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page

Unexpected data returned from the Safe Browsing API could have led to memory corruption and a potentially exploitable crashĪ double free vulnerability exists in libcurl <8.0.0 when sharing HSTS data between separate handles Use after free in Autofill payments in Google Chrome prior to 1.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page Use after free in WebRTC in Google Chrome prior to 1.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page Type confusion in V8 in Google Chrome prior to 1.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page Documents were incorrectly assuming an ordering of principal objects when ensuring we were loading an appropriately privileged principal
