![]() This vulnerability affects Firefox for Android jar:file:/// URI instead of a moz-extension:/// URI during a load request. This vulnerability affects Firefox sourceMappingUrls could allow for navigation to external protocol links in sandboxed iframes without allow-top-navigation-to-custom-protocols. Other operating systems are unaffected, and Mozilla is unable to enumerate all affected Linux Distributions.*. *This bug only affects Firefox for Linux on certain Distributions. ![]() desktop, which can be interpreted to run attacker-controlled commands. This vulnerability affects Firefox for Android. This may have created a vulnerability relating to JavaScript-implemented sandboxes such as SES. This vulnerability affects Firefox bind function may have resulted in the incorrect realm. This vulnerability affects Firefox datalist element to obscure the address bar. ![]() This could allow untrusted content to display under the guise of trusted content. This vulnerability affects Firefox ` element could have been manipulated to paint content outside of a sandboxed iframe. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. Memory safety bugs present in Firefox 120.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |