![]() ![]() (CVE-2023-28162) - When accessing throttled streams, the count of available bytes needed to be checked in the calling function to be within bounds. This could have lead to a potentially exploitable crash. (CVE-2023-28164) - While implementing on AudioWorklets, some code may have casted one type to another, invalid, dynamic type. (CVE-2023-25751) - Dragging a URL from a cross-origin iframe that was removed during the drag could have lead to user confusion and website spoofing attacks. ![]() This could lead to a potentially exploitable crash. Sometimes, when invalidating JIT code while following an iterator, the newly generated code could be overwritten incorrectly. ![]() It is, therefore, affected by multiple vulnerabilities as referenced in the mfsa2023-10 advisory. Description The version of Firefox ESR installed on the remote Windows host is prior to 102.9. Synopsis A web browser installed on the remote Windows host is affected by multiple vulnerabilities. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |