

*This bug only affects Firefox on Windows when run in non-standard configurations (such as using `runas`). If Windows failed to duplicate a handle during process creation, the sandbox code may have inadvertently freed a pointer twice, resulting in a use-after-free and a potentially exploitable crash.

VDB-240866 is the identifier assigned to this vulnerability. The exploit has been disclosed to the public and may be used. The manipulation leads to path traversal. Affected by this issue is the function handleFileRequest of the file src/main/java/com/feihong/ldap/HTTPServer.java. A vulnerability was found in WhiteHSBG JNDIExploit 1.4 on Windows.
