(CVE-2025-3155) Arbitrary file read by abusing ghelp scheme
https://gitlab.gnome.org/GNOME/yelp/-/issues/221"Yelp, the GNOME user help application, allows help documents to execute
arbitrary JavaScript. A malicious help document may exfiltrate user files
to a remote server. A malicious website may download a help document
without user intervention, then trick the user into opening a ghelp URL
that references the help document. This notably requires the attacker to
guess the filesystem path of the downloaded help document."
And we just discussed old-school .HLP exploits the other day...
#EnoughEyeballs