![]() ![]() Successful exploitation of this vulnerability may result in complete compromise of vulnerable system. A remote attacker can create a specially crafted website, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system. ![]() The vulnerability exists due to a boundary error in JIT UpdateRegExpStatics when UpdateRegExpStatics attempted to access initialStringHeap. Is there known malware, which exploits this vulnerability? Note, the vulnerability affects Firefox installations on Windows only. A remote attacker can trick the victim to visit a specially crafted website, trigger an integer overflow and execute arbitrary code on the target system. The vulnerability exists due to integer overflow in RecordedSourceSurfaceCreation. The vulnerability allows a remote attacker to execute arbitrary code on the target system. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |