Логотип exploitDog
product: "firefox"
Консоль
Логотип exploitDog

exploitDog

product: "firefox"
Mozilla Firefox

Mozilla Firefoxсвободный браузер на движке Gecko

Релизный цикл, информация об уязвимостях

Продукт: Mozilla Firefox
Вендор: mozilla

График релизов

11511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414520232024202520262027

Недавние уязвимости Mozilla Firefox

Количество 15 220

suse-cvrf логотип

SUSE-SU-2024:0578-1

почти 2 года назад

Security update for mozilla-nss

EPSS: Низкий
github логотип

GHSA-625h-2cj8-8g77

почти 2 года назад

Memory safety bugs present in Firefox 122. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 123.

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-j6qq-7xp7-c5p5

почти 2 года назад

When opening a website using the `firefox://` protocol handler, SameSite cookies were not properly respected. This vulnerability affects Firefox < 123.

CVSS3: 8.3
EPSS: Низкий
github логотип

GHSA-wp8h-p32h-fwvc

почти 2 года назад

The incorrect object was checked for NULL in the built-in profiler, potentially leading to invalid memory access and undefined behavior. *Note:* This issue only affects the application when the profiler is running. This vulnerability affects Firefox < 123.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-cq85-4f5h-qqc4

почти 2 года назад

Set-Cookie response headers were being incorrectly honored in multipart HTTP responses. If an attacker could control the Content-Type response header, as well as control part of the response body, they could inject Set-Cookie response headers that would have been honored by the browser. This vulnerability affects Firefox < 123 and Firefox ESR < 115.8.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-8q5j-74vg-j4hr

почти 2 года назад

A malicious website could have used a combination of exiting fullscreen mode and `requestPointerLock` to cause the user's mouse to be re-positioned unexpectedly, which could have led to user confusion and inadvertently granting permissions they did not intend to grant. This vulnerability affects Firefox < 123 and Firefox ESR < 115.8.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-gqrh-wgmr-mm7v

почти 2 года назад

The `fetch()` API and navigation incorrectly shared the same cache, as the cache key did not include the optional headers `fetch()` may contain. Under the correct circumstances, an attacker may have been able to poison the local browser cache by priming it with a `fetch()` response controlled by the additional headers. Upon navigation to the same URL, the user would see the cached response instead of the expected response. This vulnerability affects Firefox < 123.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-62vc-2f72-vcj3

почти 2 года назад

Memory safety bugs present in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 123 and Firefox ESR < 115.8.

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-372x-c6rw-v8f9

почти 2 года назад

Incorrect code generation could have led to unexpected numeric conversions and potential undefined behavior. *Note:* This issue only affects 32-bit ARM devices. This vulnerability affects Firefox < 123 and Firefox ESR < 115.8.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-mf2m-vhfh-2qjv

почти 2 года назад

If a website set a large custom cursor, portions of the cursor could have overlapped with the permission dialog, potentially resulting in user confusion and unexpected granted permissions. This vulnerability affects Firefox < 123 and Firefox ESR < 115.8.

CVSS3: 6.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
suse-cvrf логотип
SUSE-SU-2024:0578-1

Security update for mozilla-nss

1%
Низкий
почти 2 года назад
github логотип
GHSA-625h-2cj8-8g77

Memory safety bugs present in Firefox 122. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 123.

CVSS3: 8.1
1%
Низкий
почти 2 года назад
github логотип
GHSA-j6qq-7xp7-c5p5

When opening a website using the `firefox://` protocol handler, SameSite cookies were not properly respected. This vulnerability affects Firefox < 123.

CVSS3: 8.3
0%
Низкий
почти 2 года назад
github логотип
GHSA-wp8h-p32h-fwvc

The incorrect object was checked for NULL in the built-in profiler, potentially leading to invalid memory access and undefined behavior. *Note:* This issue only affects the application when the profiler is running. This vulnerability affects Firefox < 123.

CVSS3: 6.5
0%
Низкий
почти 2 года назад
github логотип
GHSA-cq85-4f5h-qqc4

Set-Cookie response headers were being incorrectly honored in multipart HTTP responses. If an attacker could control the Content-Type response header, as well as control part of the response body, they could inject Set-Cookie response headers that would have been honored by the browser. This vulnerability affects Firefox < 123 and Firefox ESR < 115.8.

CVSS3: 6.1
1%
Низкий
почти 2 года назад
github логотип
GHSA-8q5j-74vg-j4hr

A malicious website could have used a combination of exiting fullscreen mode and `requestPointerLock` to cause the user's mouse to be re-positioned unexpectedly, which could have led to user confusion and inadvertently granting permissions they did not intend to grant. This vulnerability affects Firefox < 123 and Firefox ESR < 115.8.

CVSS3: 6.1
0%
Низкий
почти 2 года назад
github логотип
GHSA-gqrh-wgmr-mm7v

The `fetch()` API and navigation incorrectly shared the same cache, as the cache key did not include the optional headers `fetch()` may contain. Under the correct circumstances, an attacker may have been able to poison the local browser cache by priming it with a `fetch()` response controlled by the additional headers. Upon navigation to the same URL, the user would see the cached response instead of the expected response. This vulnerability affects Firefox < 123.

CVSS3: 9.8
0%
Низкий
почти 2 года назад
github логотип
GHSA-62vc-2f72-vcj3

Memory safety bugs present in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 123 and Firefox ESR < 115.8.

CVSS3: 8.1
2%
Низкий
почти 2 года назад
github логотип
GHSA-372x-c6rw-v8f9

Incorrect code generation could have led to unexpected numeric conversions and potential undefined behavior. *Note:* This issue only affects 32-bit ARM devices. This vulnerability affects Firefox < 123 and Firefox ESR < 115.8.

CVSS3: 7.5
1%
Низкий
почти 2 года назад
github логотип
GHSA-mf2m-vhfh-2qjv

If a website set a large custom cursor, portions of the cursor could have overlapped with the permission dialog, potentially resulting in user confusion and unexpected granted permissions. This vulnerability affects Firefox < 123 and Firefox ESR < 115.8.

CVSS3: 6.1
1%
Низкий
почти 2 года назад

Уязвимостей на страницу


Поделиться