Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2025-8035 | Memory safety bugs fixed in Firefox ESR 128.13, Thunderbird ESR 128.13, Firefox ESR 140.1, | |
| CVE-2025-8044 | Memory safety bugs fixed in Firefox 141 and Thunderbird 141 | |
| CVE-2025-8040 | Memory safety bugs fixed in Firefox ESR 140.1, Thunderbird ESR 140.1, Firefox 141 and Thun | |
| CVE-2025-8034 | Memory safety bugs fixed in Firefox ESR 115.26, Firefox ESR 128.13, Thunderbird ESR 128.13 | |
| CVE-2025-8032 | XSLT documents could bypass CSP | |
| CVE-2025-8038 | CSP frame-src was not correctly enforced for paths | |
| CVE-2025-8033 | Incorrect JavaScript state machine for generators | |
| CVE-2025-8039 | Search terms persisted in URL bar | |
| CVE-2025-8030 | Potential user-assisted code execution in “Copy as cURL” command | |
| CVE-2025-8031 | Incorrect URL stripping in CSP reports | |
| CVE-2025-8037 | Nameless cookies shadow secure cookies | |
| CVE-2025-8028 | Large branch table could lead to truncated instruction | |
| CVE-2025-8029 | javascript: URLs executed on object and embed tags | |
| CVE-2025-8036 | DNS rebinding circumvents CORS | |
| CVE-2025-8027 | JavaScript engine only wrote partial return value to stack |
No comments yet