- Bug ID: 386695, 393761, 393762, 399298, 407289, 372075, 363597
| ID | Type | Summary | Product | Comp | Assignee▲ | Status▲ | Resolution | Updated |
|---|---|---|---|---|---|---|---|---|
| 372075 |
javascript: URI evaluation should use sandboxed context for to |
Core | DOM: Core & HTML | mrbkap | RESO | FIXE | 2019-03-13 | |
| 386695 | PAC privilege escalation using exception objects came from outside of sandbox | Core | Security | mrbkap | RESO | FIXE | 2008-03-22 | |
| 399298 |
Bypassing XPCNative |
Core | Security | mrbkap | VERI | FIXE | 2008-03-22 | |
| 407289 |
XPCNative |
Core | XPConnect | mrbkap | VERI | FIXE | 2008-07-08 | |
| 363597 | XSS by using javascript: url | Core | Security | mrbkap | VERI | FIXE | 2008-02-07 | |
| 393761 |
XSS and Arbitrary code execution by using XMLDocument |
Core | Security | smaug | VERI | FIXE | 2008-06-11 | |
| 393762 | Arbitrary code execution using an event handler attached to an element whose owner document has no script global object | Core | Security | smaug | VERI | FIXE | 2009-03-19 |
|
REST |
CSV |
Feed |
iCalendar
Change Columns |
Edit Search |