![]() #CVE-2023-6206: Clickjacking permission prompts using the fullscreen transition Reporter Hafiizh Impact high Description It was possible to cause the use of a MessagePort after it had alreadyīeen freed, which could potentially have led to an exploitable crash. #CVE-2023-6205: Use-after-free in MessagePort::Entangled Reporter Yangkang of 360 ATA Team Impact high Description ![]() On some systems-depending on the graphics settings and drivers-it was possible to force an out-of-bounds read and leak memory data into the images created on the canvas element. #CVE-2023-6204: Out-of-bound memory access in WebGL2 blitFramebuffer Reporter JSec of Hayyim Security Impact high Description In general, these flaws cannot be exploited through email in the Thunderbird product because scripting is disabled when reading mail, but are potentially risks in browser or browser-like contexts. Mozilla Foundation Security Advisory 2023-52 Security Vulnerabilities fixed in Thunderbird 115.5 Announced NovemImpact high Products Thunderbird Fixed in
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |