![]() The technical details are unknown and an exploit is not available. Successful exploitation requires user interaction by the victim. If an attacker could control the contents of an iframe sandboxed with allow-popups but not allow-scripts, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox.This vulnerability is traded as CVE-2022-26384. The weakness was released by Ed McManus as Bug 1744352 as confirmed advisory (Website). ![]() This is going to have an impact on confidentiality, integrity, and availability. The manipulation with an unknown input leads to a privilege escalation vulnerability. Affected is an unknown code block of the component iFrame Handler. A high score indicates an elevated risk to be targeted for this vulnerability.Ī vulnerability was found in Mozilla Thunderbird up to 91.6 ( Mail Client Software). The CTI Interest Score identifies the interest of attackers and the security community for this specific vulnerability in real-time. ![]() Our Cyber Threat Intelligence team is monitoring different web sites, mailing lists, exploit markets and social media networks.
0 Comments
Leave a Reply. |