![]() ![]() Find the full description of the security errors given below, along with the name of the errors. The impact of both these errors is termed as critical. The reporters of these errors are Wang Gang, Liu Jialei, Du Sihang, Huang Yi & Yang Kang of 360 ATA. Two zero-day errors fixed by Mozilla FirefoxĪs mentioned on the official website of Mozilla Firefox, the vulnerabilities have been fixed in the latest version of Firefox 97.0.2 and users are advised to update immediately. The use-after-free issues impact the Extensible Stylesheet Language Transformations and the WebGPU inter-process communication framework. These errors are classified as zero-day errors, which means that they have been exploited before the developers or the security team of the web browser identified them. If you already have Firefox 2, you will receive an automated update notification within 24 to 48 hours. We strongly recommend all Firefox 2 users upgrade to this latest release. These errors are called CVE-2022-26485 and CVE-2022-26486. Firefox 2.0.0.20 is now available for download on Windows, Mac, and Linux from our website. Most recently, the web browser Mozilla Firefox has launched a bunch of software updates to fix two critical security vulnerabilities. These flaws were actively exploited as well. Security errors in popular browsers including Google Chrome and Apple Safari have been spotted in the recent past. For the past few months, web browsers are being repeatedly targeted by bad actors and hackers. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |