Логотип exploitDog
product: "firefox"
Консоль
Логотип exploitDog

exploitDog

product: "firefox"
Mozilla Firefox

Mozilla Firefoxсвободный браузер на движке Gecko

Релизный цикл, информация об уязвимостях

Продукт: Mozilla Firefox
Вендор: mozilla

График релизов

11511611711811912012112212312412512612712812913013113213313413513613713813914014114214314420232024202520262027

Недавние уязвимости Mozilla Firefox

Количество 15 156

github логотип

GHSA-7jrj-xq8x-h553

больше 1 года назад

Editor code failed to check an attribute value. This could have led to an out-of-bounds read. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1.

CVSS3: 9.1
EPSS: Низкий
github логотип

GHSA-hf5v-h65q-2g27

больше 1 года назад

ANGLE failed to initialize parameters which lead to reading from uninitialized memory. This could be leveraged to leak sensitive data from memory. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-w3xp-69rr-q6gw

больше 1 года назад

A select option could partially obscure security prompts. This could be used by a malicious site to trick a user into granting permissions. *This issue only affects Android versions of Firefox.* This vulnerability affects Firefox < 129.

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-563c-g7mm-g4xp

больше 1 года назад

Incomplete WebAssembly exception handing could have led to a use-after-free. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-7m9h-4qg6-4hmh

больше 1 года назад

Firefox adds web-compatibility shims in place of some tracking scripts blocked by Enhanced Tracking Protection. On a site protected by Content Security Policy in "strict-dynamic" mode, an attacker able to inject an HTML element could have used a DOM Clobbering attack on some of the shims and achieved XSS, bypassing the CSP strict-dynamic protection. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-mcjx-2c4v-mvg9

больше 1 года назад

Select options could obscure the fullscreen notification dialog. This could be used by a malicious site to perform a spoofing attack. This vulnerability affects Firefox < 129 and Firefox ESR < 128.1.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-9wvx-3hw8-4ghf

больше 1 года назад

Insufficient checks when processing graphics shared memory could have led to memory corruption. This could be leveraged by an attacker to perform a sandbox escape. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1.

CVSS3: 8.8
EPSS: Низкий
nvd логотип

CVE-2024-7531

больше 1 года назад

Calling `PK11_Encrypt()` in NSS using CKM_CHACHA20 and the same buffer for input and output can result in plaintext on an Intel Sandy Bridge processor. In Firefox this only affects the QUIC header protection feature when the connection is using the ChaCha20-Poly1305 cipher suite. The most likely outcome is connection failure, but if the connection persists despite the high packet loss it could be possible for a network observer to identify packets as coming from the same source despite a network path change. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1.

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2024-7531

больше 1 года назад

Calling `PK11_Encrypt()` in NSS using CKM_CHACHA20 and the same buffer ...

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2024-7530

больше 1 года назад

Incorrect garbage collection interaction could have led to a use-after-free. This vulnerability affects Firefox < 129.

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
github логотип
GHSA-7jrj-xq8x-h553

Editor code failed to check an attribute value. This could have led to an out-of-bounds read. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1.

CVSS3: 9.1
0%
Низкий
больше 1 года назад
github логотип
GHSA-hf5v-h65q-2g27

ANGLE failed to initialize parameters which lead to reading from uninitialized memory. This could be leveraged to leak sensitive data from memory. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1.

CVSS3: 7.5
0%
Низкий
больше 1 года назад
github логотип
GHSA-w3xp-69rr-q6gw

A select option could partially obscure security prompts. This could be used by a malicious site to trick a user into granting permissions. *This issue only affects Android versions of Firefox.* This vulnerability affects Firefox < 129.

CVSS3: 8.1
0%
Низкий
больше 1 года назад
github логотип
GHSA-563c-g7mm-g4xp

Incomplete WebAssembly exception handing could have led to a use-after-free. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1.

CVSS3: 9.8
0%
Низкий
больше 1 года назад
github логотип
GHSA-7m9h-4qg6-4hmh

Firefox adds web-compatibility shims in place of some tracking scripts blocked by Enhanced Tracking Protection. On a site protected by Content Security Policy in "strict-dynamic" mode, an attacker able to inject an HTML element could have used a DOM Clobbering attack on some of the shims and achieved XSS, bypassing the CSP strict-dynamic protection. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1.

CVSS3: 6.1
0%
Низкий
больше 1 года назад
github логотип
GHSA-mcjx-2c4v-mvg9

Select options could obscure the fullscreen notification dialog. This could be used by a malicious site to perform a spoofing attack. This vulnerability affects Firefox < 129 and Firefox ESR < 128.1.

CVSS3: 6.5
0%
Низкий
больше 1 года назад
github логотип
GHSA-9wvx-3hw8-4ghf

Insufficient checks when processing graphics shared memory could have led to memory corruption. This could be leveraged by an attacker to perform a sandbox escape. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1.

CVSS3: 8.8
0%
Низкий
больше 1 года назад
nvd логотип
CVE-2024-7531

Calling `PK11_Encrypt()` in NSS using CKM_CHACHA20 and the same buffer for input and output can result in plaintext on an Intel Sandy Bridge processor. In Firefox this only affects the QUIC header protection feature when the connection is using the ChaCha20-Poly1305 cipher suite. The most likely outcome is connection failure, but if the connection persists despite the high packet loss it could be possible for a network observer to identify packets as coming from the same source despite a network path change. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1.

CVSS3: 6.5
0%
Низкий
больше 1 года назад
debian логотип
CVE-2024-7531

Calling `PK11_Encrypt()` in NSS using CKM_CHACHA20 and the same buffer ...

CVSS3: 6.5
0%
Низкий
больше 1 года назад
nvd логотип
CVE-2024-7530

Incorrect garbage collection interaction could have led to a use-after-free. This vulnerability affects Firefox < 129.

CVSS3: 8.8
0%
Низкий
больше 1 года назад

Уязвимостей на страницу


Поделиться