![]() Mozila says it is “aware of targeted attacks in the wild abusing this flaw,” but doesn’t give any information about how widespread the attacks are. That means that an attacker could exploit the Javascript code to surreptitiously hack a user’s PC and install malicious code outside of Firefox. In technical terms, as Mozilla explains, “Incorrect alias information in IonMonkey JIT compiler for setting array elements could lead to a type confusion. The bad news is that it’s already being exploited in the wild. ![]() The good news is that it’s already been patched. It comes from Mozilla’s popular Firefox browser, and it’s so dangerous, the Homeland Security Cybersecurity and Infrastructure Security Agency is warning users about it. We’re just 10 days into 2020, and already we have our first critical security flaw.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |