![]() Other operating systems are unaffected, and Mozilla is unable to enumerate all affected Linux Distributions.*. ![]() *This bug only affects Firefox for Linux on certain Distributions. desktop, which can be interpreted to run attacker-controlled commands. This vulnerability affects Firefox for Android. This may have created a vulnerability relating to JavaScript-implemented sandboxes such as SES. This vulnerability affects Firefox bind function may have resulted in the incorrect realm. This vulnerability affects Firefox datalist element to obscure the address bar. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. Memory safety bugs present in Firefox 117, Firefox ESR 115.2, and Thunderbird 115.2. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. The identifier VDB-241649 was assigned to this vulnerability. The exploit has been disclosed to the public and may be used. The exploitation is known to be difficult. The complexity of an attack is rather high. The manipulation leads to cross site scripting. This issue affects some unknown processing of the component Select Text Handler. ![]() A vulnerability was found in Translator PoqDev Add-On 1.0.11 on Firefox. ![]()
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |