This month’s scheduled Firefox launch is out, with the brand new 102.0 model patching 19 CVE-numbered bugs.

Regardless of the massive variety of CVEs, the patches don’t embrace any bugs already being exploited within the wild (identified within the jargon as zero-days), and don’t embrace any bugs labelled Essential.

Maybe essentially the most vital patch is the one for CVE-2022-34479, entitled: A popup window could possibly be resized in a option to overlay the handle bar with internet content material.

This bug permits a malicious web site to create a popup window after which resize it to overwrite the browser’s personal handle bar.

Happily, this handle bar spoofing bug solely applies to Firefox on Linux; on different working methods, the bug apparently can’t be triggered.

As you already know, the browser’s personal visible elements, together with the menu bar, search bar, handle bar, safety alerts, HTTPS padlock icon and extra, are speculated to be shielded from manipulation by untrusted internet pages rendered by the browser.

These sacrosanct consumer interface elements are identified within the jargon as chrome (from which Google’s browser will get its identify, in case you have been questioning).

Browser chrome is off-limits to internet pages for apparent causes – to forestall bogus web sites from misrepresenting themselves as reliable.

Which means although phishing websites typically reproduce the look-and-feel of a reliable web site with uncanny precision, they aren’t supposed to have the ability to trick your browser into presenting them as in the event that they have been downloaded from a real URL.


Uncanny resemblance however thankfully the incorrect URL!
Aspect-by-side view of a latest rip-off concentrating on a South African financial institution