![]() Note, the vulnerability affects Firefox installations on Windows only.ĬWE-ID: CWE-20 - Improper input validation Successful exploitation of this vulnerability may result in complete compromise of vulnerable system. A remote attacker can trick the victim to visit a specially crafted website, trigger an integer overflow and execute arbitrary code on the target system. The vulnerability exists due to integer overflow in RecordedSourceSurfaceCreation. The vulnerability allows a remote attacker to execute arbitrary code on the target system. A remote attacker can trick the victim to open a specially crafted website, trigger memory corruption and execute arbitrary code on the system. The vulnerability exists due to a use-after-free error in IPC FilePickerShownCallback. Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system. The vulnerability exists due to a use-after-free error in IPC ColorPickerShownCallback. Is there known malware, which exploits this vulnerability? How the attacker can exploit this vulnerability? Vulnerable software versionsįirefox for Android: 100.1.0 - 116.3.0 CPE2.3 The vulnerability exists due to a use-after-free error in IPC CanvasTranslator. The vulnerability allows a remote attacker to compromise vulnerable system.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |