![]() This vulnerability affects Firefox for Android window.open, fullscreen requests, window.name assignments, and setInterval calls. This leaked directory paths on the user's machine. ![]() This vulnerability affects Firefox for Android jar:file:/// URI instead of a moz-extension:/// URI during a load request. This vulnerability affects Firefox sourceMappingUrls could allow for navigation to external protocol links in sandboxed iframes without allow-top-navigation-to-custom-protocols. Other operating systems are unaffected, and Mozilla is unable to enumerate all affected Linux Distributions.*. *This bug only affects Firefox for Linux on certain Distributions. desktop, which can be interpreted to run attacker-controlled commands. This vulnerability affects Firefox for Android. This may have created a vulnerability relating to JavaScript-implemented sandboxes such as SES. This vulnerability affects Firefox bind function may have resulted in the incorrect realm. ![]() ![]() This vulnerability affects Firefox for iOS datalist element to obscure the address bar. When opening a page in reader mode, the redirect URL could have caused attacker-controlled script to execute in a reflected Cross-Site Scripting (XSS) attack. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |