![]() ![]() This may have lead future code to be incorrect and vulnerable. (CVE-2023-28162) - When accessing throttled streams, the count of available bytes needed to be checked in the calling function to be within bounds. This could have lead to a potentially exploitable crash. (CVE-2023-28164) - While implementing on AudioWorklets, some code may have casted one type to another, invalid, dynamic type. (CVE-2023-25751) - Dragging a URL from a cross-origin iframe that was removed during the drag could have lead to user confusion and website spoofing attacks. This could lead to a potentially exploitable crash. Sometimes, when invalidating JIT code while following an iterator, the newly generated code could be overwritten incorrectly. It is, therefore, affected by multiple vulnerabilities as referenced in the mfsa2023-10 advisory. Description The version of Firefox ESR installed on the remote Windows host is prior to 102.9. ![]() Synopsis A web browser installed on the remote Windows host is affected by multiple vulnerabilities.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |