Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-m98j-9vrj-cgp2

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The URL parsing implementation in Mozilla Firefox before 42.0 improperly recognizes escaped characters in hostnames within Location headers, which allows remote attackers to obtain sensitive information via vectors involving a redirect.

The URL parsing implementation in Mozilla Firefox before 42.0 improperly recognizes escaped characters in hostnames within Location headers, which allows remote attackers to obtain sensitive information via vectors involving a redirect.

EPSS

Процентиль: 68%
0.00567
Низкий

Дефекты

CWE-200

Связанные уязвимости

ubuntu
больше 10 лет назад

The URL parsing implementation in Mozilla Firefox before 42.0 improperly recognizes escaped characters in hostnames within Location headers, which allows remote attackers to obtain sensitive information via vectors involving a redirect.

redhat
больше 10 лет назад

The URL parsing implementation in Mozilla Firefox before 42.0 improperly recognizes escaped characters in hostnames within Location headers, which allows remote attackers to obtain sensitive information via vectors involving a redirect.

nvd
больше 10 лет назад

The URL parsing implementation in Mozilla Firefox before 42.0 improperly recognizes escaped characters in hostnames within Location headers, which allows remote attackers to obtain sensitive information via vectors involving a redirect.

debian
больше 10 лет назад

The URL parsing implementation in Mozilla Firefox before 42.0 improper ...

fstec
больше 10 лет назад

Уязвимость браузера Firefox, позволяющая нарушителю получить конфиденциальную информацию

EPSS

Процентиль: 68%
0.00567
Низкий

Дефекты

CWE-200