Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-34474

Опубликовано: 22 дек. 2022
Источник: debian
EPSS Низкий

Описание

Even when an iframe was sandboxed with <code>allow-top-navigation-by-user-activation</code>, if it received a redirect header to an external protocol the browser would process the redirect and prompt the user as appropriate. This vulnerability affects Firefox < 102.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
firefoxfixed102.0-1package

Примечания

  • https://www.mozilla.org/en-US/security/advisories/mfsa2022-24/#CVE-2022-34474

EPSS

Процентиль: 47%
0.00238
Низкий

Связанные уязвимости

CVSS3: 6.1
ubuntu
около 3 лет назад

Even when an iframe was sandboxed with <code>allow-top-navigation-by-user-activation</code>, if it received a redirect header to an external protocol the browser would process the redirect and prompt the user as appropriate. This vulnerability affects Firefox < 102.

CVSS3: 6.1
nvd
около 3 лет назад

Even when an iframe was sandboxed with <code>allow-top-navigation-by-user-activation</code>, if it received a redirect header to an external protocol the browser would process the redirect and prompt the user as appropriate. This vulnerability affects Firefox < 102.

CVSS3: 6.1
github
около 3 лет назад

Even when an iframe was sandboxed with <code>allow-top-navigation-by-user-activation</code>, if it received a redirect header to an external protocol the browser would process the redirect and prompt the user as appropriate. This vulnerability affects Firefox < 102.

suse-cvrf
больше 3 лет назад

Security update for MozillaFirefox

suse-cvrf
больше 3 лет назад

Security update for MozillaFirefox

EPSS

Процентиль: 47%
0.00238
Низкий