![]() “Successful exploitation of this vulnerability could allow an attacker to bypass security restrictions (leak valid payment details and accept invalid payment details) on the targeted system,” it warned. ![]() ![]() “These vulnerabilities exist in Mozilla Firefox due to abuse of XSLT error handling, cross-origin iframe referencing an XSLT document… that results in a use-after-free error and memory safety bugs within the browser engine,” explained the cyber agency.Ī remote attacker could exploit these vulnerabilities by convincing a victim to open a specially-crafted web request.ĬERT-In, which comes under the IT Ministry, advised users to update to the latest Mozilla Firefox versions.ĬERT-In also found a vulnerability in open source coding platform Drupal which could allow an attacker to bypass security restrictions on the targeted system.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |