Логотип exploitDog
product: "firefox"
Консоль
Логотип exploitDog

exploitDog

product: "firefox"
Mozilla Firefox

Mozilla Firefoxсвободный браузер на движке Gecko

Релизный цикл, информация об уязвимостях

Продукт: Mozilla Firefox
Вендор: mozilla

График релизов

11511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414520232024202520262027

Недавние уязвимости Mozilla Firefox

Количество 15 220

github логотип

GHSA-3jcf-9x2f-86h4

больше 1 года назад

Memory safety bugs present in Firefox 126. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 127.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-gmgg-93h8-cp32

больше 1 года назад

By manipulating the text in an `&lt;input&gt;` tag, an attacker could have caused corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12.

CVSS3: 8.6
EPSS: Низкий
github логотип

GHSA-frpv-8jj9-m3cv

больше 1 года назад

By manipulating the fullscreen feature while opening a data-list, an attacker could have overlaid a text box over the address bar. This could have led to user confusion and possible spoofing attacks. This vulnerability affects Firefox < 127.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-gfgx-4754-9hhp

больше 1 года назад

If an out-of-memory condition occurs at a specific point using allocations in the probabilistic heap checker, an assertion could have been triggered, and in rarer situations, memory corruption could have occurred. This vulnerability affects Firefox < 127.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-xhxm-p3qv-qprc

больше 1 года назад

By tricking the browser with a `X-Frame-Options` header, a sandboxed iframe could have presented a button that, if clicked by a user, would bypass restrictions to open a new window. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12.

CVSS3: 4.7
EPSS: Низкий
github логотип

GHSA-pqfc-h2m7-5p9p

больше 1 года назад

On Windows, when using the 'Save As' functionality, an attacker could have tricked the browser into saving the file with a disallowed extension such as `.url` by including an invalid character in the extension. *Note:* This issue only affected Windows operating systems. Other operating systems are unaffected. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-4c8g-9w4h-h6xm

больше 1 года назад

If a specific sequence of actions is performed when opening a new tab, the triggering principal associated with the new tab may have been incorrect. The triggering principal is used to calculate many values, including the `Referer` and `Sec-*` headers, meaning there is the potential for incorrect security checks within the browser in addition to incorrect or misleading information sent to remote websites. *This bug only affects Firefox for Android. Other versions of Firefox are unaffected.* This vulnerability affects Firefox < 127.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-hx83-hmj3-pffc

больше 1 года назад

In addition to detecting when a user was taking a screenshot (XXX), a website was able to overlay the 'My Shots' button that appeared, and direct the user to a replica Firefox Screenshots page that could be used for phishing. This vulnerability affects Firefox < 127.

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-pxf8-583j-3rmh

больше 1 года назад

Offscreen Canvas did not properly track cross-origin tainting, which could be used to access image data from another site in violation of same-origin policy. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-j6vm-3wj6-fwrh

больше 1 года назад

An attacker could have caused a use-after-free in the JavaScript engine to read memory in the JavaScript string section of the heap. This vulnerability affects Firefox < 127.

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
github логотип
GHSA-3jcf-9x2f-86h4

Memory safety bugs present in Firefox 126. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 127.

CVSS3: 9.8
1%
Низкий
больше 1 года назад
github логотип
GHSA-gmgg-93h8-cp32

By manipulating the text in an `&lt;input&gt;` tag, an attacker could have caused corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12.

CVSS3: 8.6
2%
Низкий
больше 1 года назад
github логотип
GHSA-frpv-8jj9-m3cv

By manipulating the fullscreen feature while opening a data-list, an attacker could have overlaid a text box over the address bar. This could have led to user confusion and possible spoofing attacks. This vulnerability affects Firefox < 127.

CVSS3: 6.1
0%
Низкий
больше 1 года назад
github логотип
GHSA-gfgx-4754-9hhp

If an out-of-memory condition occurs at a specific point using allocations in the probabilistic heap checker, an assertion could have been triggered, and in rarer situations, memory corruption could have occurred. This vulnerability affects Firefox < 127.

CVSS3: 9.8
1%
Низкий
больше 1 года назад
github логотип
GHSA-xhxm-p3qv-qprc

By tricking the browser with a `X-Frame-Options` header, a sandboxed iframe could have presented a button that, if clicked by a user, would bypass restrictions to open a new window. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12.

CVSS3: 4.7
0%
Низкий
больше 1 года назад
github логотип
GHSA-pqfc-h2m7-5p9p

On Windows, when using the 'Save As' functionality, an attacker could have tricked the browser into saving the file with a disallowed extension such as `.url` by including an invalid character in the extension. *Note:* This issue only affected Windows operating systems. Other operating systems are unaffected. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12.

CVSS3: 6.5
0%
Низкий
больше 1 года назад
github логотип
GHSA-4c8g-9w4h-h6xm

If a specific sequence of actions is performed when opening a new tab, the triggering principal associated with the new tab may have been incorrect. The triggering principal is used to calculate many values, including the `Referer` and `Sec-*` headers, meaning there is the potential for incorrect security checks within the browser in addition to incorrect or misleading information sent to remote websites. *This bug only affects Firefox for Android. Other versions of Firefox are unaffected.* This vulnerability affects Firefox < 127.

CVSS3: 5.3
0%
Низкий
больше 1 года назад
github логотип
GHSA-hx83-hmj3-pffc

In addition to detecting when a user was taking a screenshot (XXX), a website was able to overlay the 'My Shots' button that appeared, and direct the user to a replica Firefox Screenshots page that could be used for phishing. This vulnerability affects Firefox < 127.

CVSS3: 4.3
0%
Низкий
больше 1 года назад
github логотип
GHSA-pxf8-583j-3rmh

Offscreen Canvas did not properly track cross-origin tainting, which could be used to access image data from another site in violation of same-origin policy. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12.

CVSS3: 6.1
0%
Низкий
больше 1 года назад
github логотип
GHSA-j6vm-3wj6-fwrh

An attacker could have caused a use-after-free in the JavaScript engine to read memory in the JavaScript string section of the heap. This vulnerability affects Firefox < 127.

CVSS3: 7.5
0%
Низкий
больше 1 года назад

Уязвимостей на страницу


Поделиться