Other operating systems are unaffected.*. *This bug only affects Firefox for Android. When receiving a URL through a SEND intent, Firefox would have searched for the text, but subsequent usages of the address bar might have caused the URL to load unintentionally, which could lead to XSS and spoofing attacks. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95. Using the Location API in a loop could have caused severe application hangs and crashes. ![]() It was possible to recreate previous cursor spoofing attacks against users with a zoomed native cursor. If you want to see a complete summary for this CPE, please contact us.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |