10/31/2023 0 Comments Mozilla firefox 41.0.2![]() ![]() It is assigned to the family MacOS X Local Security Checks and running in the context local. The vulnerability scanner Nessus provides a plugin with the ID 86417 (Firefox < 41.0.2 'fetch' API Cross-Origin Bypass (Mac OS X)), which helps to determine the existence of the flaw in a target environment. This vulnerability is assigned to T1068 by the MITRE ATT&CK project. Technical details are known, but there is no available exploit. The exploitation doesn't require any form of authentication. It is possible to launch the attack remotely. This vulnerability is traded as CVE-2015-7184 since. The weakness was presented by Abdulrahman Alqabandi as MFSA 2015-11 as confirmed security advisory (Website). This is going to have an impact on integrity. The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor. The manipulation with an unknown input leads to a access control vulnerability (Cross-Origin Resource Sharing). Affected is the function fetch of the component API. ![]() ![]() A high score indicates an elevated risk to be targeted for this vulnerability.Ī vulnerability classified as critical has been found in Mozilla Firefox 41.0.1 ( Web Browser). The CTI Interest Score identifies the interest of attackers and the security community for this specific vulnerability in real-time. Our Cyber Threat Intelligence team is monitoring different web sites, mailing lists, exploit markets and social media networks. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |