Количество 7
Количество 7
CVE-2018-5181
If a URL using the "file:" protocol is dragged and dropped onto an open tab that is running in a different child process the tab will open a local file corresponding to the dropped URL, contrary to policy. One way to make the target tab open more reliably in a separate process is to open it with the "noopener" keyword. This vulnerability affects Firefox < 60.
CVE-2018-5181
If a URL using the "file:" protocol is dragged and dropped onto an open tab that is running in a different child process the tab will open a local file corresponding to the dropped URL, contrary to policy. One way to make the target tab open more reliably in a separate process is to open it with the "noopener" keyword. This vulnerability affects Firefox < 60.
CVE-2018-5181
If a URL using the "file:" protocol is dragged and dropped onto an open tab that is running in a different child process the tab will open a local file corresponding to the dropped URL, contrary to policy. One way to make the target tab open more reliably in a separate process is to open it with the "noopener" keyword. This vulnerability affects Firefox < 60.
CVE-2018-5181
If a URL using the "file:" protocol is dragged and dropped onto an ope ...
GHSA-2f9m-9655-mxcg
If a URL using the "file:" protocol is dragged and dropped onto an open tab that is running in a different child process the tab will open a local file corresponding to the dropped URL, contrary to policy. One way to make the target tab open more reliably in a separate process is to open it with the "noopener" keyword. This vulnerability affects Firefox < 60.
BDU:2019-03519
Уязвимость браузера Firefox, связанная с отсутствием защиты служебных данных, позволяющая нарушителю получить конфиденциальную информацию
SUSE-SU-2019:2872-1
Security update for MozillaFirefox
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2018-5181 If a URL using the "file:" protocol is dragged and dropped onto an open tab that is running in a different child process the tab will open a local file corresponding to the dropped URL, contrary to policy. One way to make the target tab open more reliably in a separate process is to open it with the "noopener" keyword. This vulnerability affects Firefox < 60. | CVSS3: 7.5 | 1% Низкий | больше 7 лет назад | |
CVE-2018-5181 If a URL using the "file:" protocol is dragged and dropped onto an open tab that is running in a different child process the tab will open a local file corresponding to the dropped URL, contrary to policy. One way to make the target tab open more reliably in a separate process is to open it with the "noopener" keyword. This vulnerability affects Firefox < 60. | CVSS3: 7.5 | 1% Низкий | почти 8 лет назад | |
CVE-2018-5181 If a URL using the "file:" protocol is dragged and dropped onto an open tab that is running in a different child process the tab will open a local file corresponding to the dropped URL, contrary to policy. One way to make the target tab open more reliably in a separate process is to open it with the "noopener" keyword. This vulnerability affects Firefox < 60. | CVSS3: 7.5 | 1% Низкий | больше 7 лет назад | |
CVE-2018-5181 If a URL using the "file:" protocol is dragged and dropped onto an ope ... | CVSS3: 7.5 | 1% Низкий | больше 7 лет назад | |
GHSA-2f9m-9655-mxcg If a URL using the "file:" protocol is dragged and dropped onto an open tab that is running in a different child process the tab will open a local file corresponding to the dropped URL, contrary to policy. One way to make the target tab open more reliably in a separate process is to open it with the "noopener" keyword. This vulnerability affects Firefox < 60. | CVSS3: 7.5 | 1% Низкий | больше 3 лет назад | |
BDU:2019-03519 Уязвимость браузера Firefox, связанная с отсутствием защиты служебных данных, позволяющая нарушителю получить конфиденциальную информацию | CVSS3: 6.5 | 1% Низкий | больше 7 лет назад | |
SUSE-SU-2019:2872-1 Security update for MozillaFirefox | больше 6 лет назад |
Уязвимостей на страницу