canmove, Confirmed users, Bureaucrats and Sysops emeriti
2,776
edits
| Line 60: | Line 60: | ||
* Content spoofing (non-html) | * Content spoofing (non-html) | ||
;'''sec-other''': Bugs that may not be exploitable security issues but are kept confidential to protect sensitive information. Bugs that contain sensitive information about the bug submitter or another user Bugs that are related to security issues currently unfixed in Mozilla products or other products | |||
''Examples:'' | |||
* Flaws we need to track that are not in our code base | |||
;'''Mitigating Circumstances''': | ;'''Mitigating Circumstances''': | ||
| Line 66: | Line 70: | ||
As a rough guide, to be considered for reduction in severity an exploit should execute successfully less than 10% of the time. If measures can be taken to improve the reliability of the exploit to over 10% (by combining it with other existing bugs or techniques), then it should not be considered to be mitigated. | As a rough guide, to be considered for reduction in severity an exploit should execute successfully less than 10% of the time. If measures can be taken to improve the reliability of the exploit to over 10% (by combining it with other existing bugs or techniques), then it should not be considered to be mitigated. | ||
|} | |} | ||