Manipulating individual parts of a URL object could have caused an out-of-bounds read, leaking process memory to malicious JavaScript. External Reference:

Acknowledgments: Name: the Mozilla project Upstream: Marcin ‘Icewall’ Noga (Cisco Talos)
….



Source link

You must be logged in to post a comment.