![]() ![]() Reporter turistu Impact moderate Description #CVE-2023-6208: Using Selection API would copy contents into X11 primary selection. Ownership mismanagement led to a use-after-free in ReadableByteStreams References #CVE-2023-6207: Use-after-free in ReadableByteStreamQueueEntry::Buffer Reporter Yangkang of 360 ATA Team Impact high Description To click where the permission grant button would be about to appear. It was possible to use this fact to surprise users by luring them The length of the anti-clickjacking delay on permission prompts. The black fade animation when exiting fullscreen is roughly #CVE-2023-6206: Clickjacking permission prompts using the fullscreen transition Reporter Hafiizh Impact high Description It was possible to cause the use of a MessagePort after it had alreadyīeen freed, which could potentially have led to an exploitable crash. #CVE-2023-6205: Use-after-free in MessagePort::Entangled Reporter Yangkang of 360 ATA Team Impact high Description On some systems-depending on the graphics settings and drivers-it was possible to force an out-of-bounds read and leak memory data into the images created on the canvas element. ![]() #CVE-2023-6204: Out-of-bound memory access in WebGL2 blitFramebuffer Reporter JSec of Hayyim Security Impact high Description Mozilla Foundation Security Advisory 2023-50 Security Vulnerabilities fixed in Firefox ESR 115.5.0 Announced NovemImpact high Products Firefox ESR Fixed in ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |