Security/ProcessIsolation/ThreatModel: Difference between revisions

Line 18: Line 18:
*full-privilege extension could be remotely installed without user consent
*full-privilege extension could be remotely installed without user consent
*overwrite application settings
*overwrite application settings
*process could import an external library and call its functions
*process could take advantage of race conditions to modify a system call / message between the time a security check is performed and the API is actually called


==System / Local Network Data Theft==
==System / Local Network Data Theft==
Confirmed users
717

edits