![]() ![]() *This bug only affects Firefox on Windows when run in non-standard configurations (such as using `runas`). If Windows failed to duplicate a handle during process creation, the sandbox code may have inadvertently freed a pointer twice, resulting in a use-after-free and a potentially exploitable crash. VDB-240866 is the identifier assigned to this vulnerability. The exploit has been disclosed to the public and may be used. The manipulation leads to path traversal. ![]() Affected by this issue is the function handleFileRequest of the file src/main/java/com/feihong/ldap/HTTPServer.java. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |