Описание
There was a way to change the value of JavaScript Object properties that were supposed to be non-writeable. This vulnerability affects Firefox < 144, Firefox ESR < 115.29, Firefox ESR < 140.4, Thunderbird < 144, and Thunderbird < 140.4.
There was a way to change the value of JavaScript Object properties that were supposed to be non-writeable. This vulnerability affects Firefox < 144, Firefox ESR < 115.29, Firefox ESR < 140.4, Thunderbird < 144, and Thunderbird < 140.4.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2025-11711
- https://bugzilla.mozilla.org/show_bug.cgi?id=1989978
- https://lists.debian.org/debian-lts-announce/2025/10/msg00015.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00031.html
- https://www.mozilla.org/security/advisories/mfsa2025-81
- https://www.mozilla.org/security/advisories/mfsa2025-82
- https://www.mozilla.org/security/advisories/mfsa2025-83
- https://www.mozilla.org/security/advisories/mfsa2025-84
- https://www.mozilla.org/security/advisories/mfsa2025-85
Связанные уязвимости
There was a way to change the value of JavaScript Object properties that were supposed to be non-writeable. This vulnerability affects Firefox < 144, Firefox ESR < 115.29, Firefox ESR < 140.4, Thunderbird < 144, and Thunderbird < 140.4.
There was a way to change the value of JavaScript Object properties that were supposed to be non-writeable. This vulnerability affects Firefox < 144, Firefox ESR < 115.29, Firefox ESR < 140.4, Thunderbird < 144, and Thunderbird < 140.4.
There was a way to change the value of JavaScript Object properties th ...
Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с использованием небезопасных механизмов обработки аутентификационных данных в памяти операционной системы, позволяющая нарушителю выполнить произвольный код