![]() ![]() This vulnerability affects Firefox for Android window.open, fullscreen requests, window.name assignments, and setInterval calls. This leaked directory paths on the user's machine. This vulnerability affects Firefox for Android jar:file:/// URI instead of a moz-extension:/// URI during a load request. This vulnerability affects Firefox sourceMappingUrls could allow for navigation to external protocol links in sandboxed iframes without allow-top-navigation-to-custom-protocols. Other operating systems are unaffected, and Mozilla is unable to enumerate all affected Linux Distributions.*. *This bug only affects Firefox for Linux on certain Distributions. desktop, which can be interpreted to run attacker-controlled commands. This vulnerability affects Firefox for Android. This may have created a vulnerability relating to JavaScript-implemented sandboxes such as SES. This vulnerability affects Firefox bind function may have resulted in the incorrect realm. ![]() This vulnerability affects Firefox datalist element to obscure the address bar. This could allow untrusted content to display under the guise of trusted content. This vulnerability affects Firefox ` element could have been manipulated to paint content outside of a sandboxed iframe. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. ![]() Memory safety bugs present in Firefox 120. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |