Bug 1559858 Comment 0 Edit History

Note: The actual edited comment in the bug view page will always show the original commenter’s name and original timestamp.

A successful exploit in the child process, my use the messageManager to request itself (or really any URL) being opened in the parent process with the `Prompt:Open` message.

This allows for running the exploit again and thus bypassing the sandbox.
A successful exploit in the child process may use the messageManager to request itself (or really any URL) being opened in the parent process with the `Prompt:Open` message.

This allows for running the exploit again and thus bypassing the sandbox.

Back to Bug 1559858 Comment 0