Логотип exploitDog
product: "firefox"
Консоль
Логотип exploitDog

exploitDog

product: "firefox"
Mozilla Firefox

Mozilla Firefoxсвободный браузер на движке Gecko

Релизный цикл, информация об уязвимостях

Продукт: Mozilla Firefox
Вендор: mozilla

График релизов

11511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614720232024202520262027

Недавние уязвимости Mozilla Firefox

Количество 15 501

github логотип

GHSA-gc3q-f2fq-g2xq

больше 1 года назад

Memory corruption in the networking stack could have led to a potentially exploitable crash. This vulnerability affects Firefox < 125 and Firefox ESR < 115.12.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-frpv-8jj9-m3cv

больше 1 года назад

By manipulating the fullscreen feature while opening a data-list, an attacker could have overlaid a text box over the address bar. This could have led to user confusion and possible spoofing attacks. This vulnerability affects Firefox < 127.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-gmgg-93h8-cp32

больше 1 года назад

By manipulating the text in an `&lt;input&gt;` tag, an attacker could have caused corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12.

CVSS3: 8.6
EPSS: Низкий
github логотип

GHSA-4c8g-9w4h-h6xm

больше 1 года назад

If a specific sequence of actions is performed when opening a new tab, the triggering principal associated with the new tab may have been incorrect. The triggering principal is used to calculate many values, including the `Referer` and `Sec-*` headers, meaning there is the potential for incorrect security checks within the browser in addition to incorrect or misleading information sent to remote websites. *This bug only affects Firefox for Android. Other versions of Firefox are unaffected.* This vulnerability affects Firefox < 127.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-pxf8-583j-3rmh

больше 1 года назад

Offscreen Canvas did not properly track cross-origin tainting, which could be used to access image data from another site in violation of same-origin policy. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-pqfc-h2m7-5p9p

больше 1 года назад

On Windows, when using the 'Save As' functionality, an attacker could have tricked the browser into saving the file with a disallowed extension such as `.url` by including an invalid character in the extension. *Note:* This issue only affected Windows operating systems. Other operating systems are unaffected. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-j6vm-3wj6-fwrh

больше 1 года назад

An attacker could have caused a use-after-free in the JavaScript engine to read memory in the JavaScript string section of the heap. This vulnerability affects Firefox < 127.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-3fxj-qpxv-j6qj

больше 1 года назад

By monitoring the time certain operations take, an attacker could have guessed which external protocol handlers were functional on a user's system. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12.

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-xhxm-p3qv-qprc

больше 1 года назад

By tricking the browser with a `X-Frame-Options` header, a sandboxed iframe could have presented a button that, if clicked by a user, would bypass restrictions to open a new window. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12.

CVSS3: 4.7
EPSS: Низкий
github логотип

GHSA-g23m-h4v3-g2qq

больше 1 года назад

If a garbage collection was triggered at the right time, a use-after-free could have occurred during object transplant. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12.

CVSS3: 8.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
github логотип
GHSA-gc3q-f2fq-g2xq

Memory corruption in the networking stack could have led to a potentially exploitable crash. This vulnerability affects Firefox < 125 and Firefox ESR < 115.12.

CVSS3: 7.5
1%
Низкий
больше 1 года назад
github логотип
GHSA-frpv-8jj9-m3cv

By manipulating the fullscreen feature while opening a data-list, an attacker could have overlaid a text box over the address bar. This could have led to user confusion and possible spoofing attacks. This vulnerability affects Firefox < 127.

CVSS3: 6.1
0%
Низкий
больше 1 года назад
github логотип
GHSA-gmgg-93h8-cp32

By manipulating the text in an `&lt;input&gt;` tag, an attacker could have caused corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12.

CVSS3: 8.6
2%
Низкий
больше 1 года назад
github логотип
GHSA-4c8g-9w4h-h6xm

If a specific sequence of actions is performed when opening a new tab, the triggering principal associated with the new tab may have been incorrect. The triggering principal is used to calculate many values, including the `Referer` and `Sec-*` headers, meaning there is the potential for incorrect security checks within the browser in addition to incorrect or misleading information sent to remote websites. *This bug only affects Firefox for Android. Other versions of Firefox are unaffected.* This vulnerability affects Firefox < 127.

CVSS3: 5.3
1%
Низкий
больше 1 года назад
github логотип
GHSA-pxf8-583j-3rmh

Offscreen Canvas did not properly track cross-origin tainting, which could be used to access image data from another site in violation of same-origin policy. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12.

CVSS3: 6.1
1%
Низкий
больше 1 года назад
github логотип
GHSA-pqfc-h2m7-5p9p

On Windows, when using the 'Save As' functionality, an attacker could have tricked the browser into saving the file with a disallowed extension such as `.url` by including an invalid character in the extension. *Note:* This issue only affected Windows operating systems. Other operating systems are unaffected. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12.

CVSS3: 6.5
0%
Низкий
больше 1 года назад
github логотип
GHSA-j6vm-3wj6-fwrh

An attacker could have caused a use-after-free in the JavaScript engine to read memory in the JavaScript string section of the heap. This vulnerability affects Firefox < 127.

CVSS3: 7.5
1%
Низкий
больше 1 года назад
github логотип
GHSA-3fxj-qpxv-j6qj

By monitoring the time certain operations take, an attacker could have guessed which external protocol handlers were functional on a user's system. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12.

CVSS3: 4.3
4%
Низкий
больше 1 года назад
github логотип
GHSA-xhxm-p3qv-qprc

By tricking the browser with a `X-Frame-Options` header, a sandboxed iframe could have presented a button that, if clicked by a user, would bypass restrictions to open a new window. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12.

CVSS3: 4.7
0%
Низкий
больше 1 года назад
github логотип
GHSA-g23m-h4v3-g2qq

If a garbage collection was triggered at the right time, a use-after-free could have occurred during object transplant. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12.

CVSS3: 8.1
1%
Низкий
больше 1 года назад

Уязвимостей на страницу


Поделиться