The vulnerability exists due to usage of incorrect values during WASM compilation, resulting in a state value to be used for a global variable in WASM JIT analysis in the content process. ![]() The vulnerability allows a remote attacker to compromise the affected system. Is there known malware, which exploits this vulnerability? How the attacker can exploit this vulnerability? A remote attacker can violation the same-origin policy and access image data from another website. The vulnerability exists due to improper tracking of cross-origin tainting in Offscreen Canvas. ![]() ![]() The vulnerability allows a remote attacker to bypass implemented security restrictions. CWE-ID: CWE-346 - Origin Validation Error
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |