Логотип exploitDog
bind:CVE-2019-9812
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-9812

Количество 16

Количество 16

ubuntu логотип

CVE-2019-9812

почти 6 лет назад

Given a compromised sandboxed content process due to a separate vulnerability, it is possible to escape that sandbox by loading accounts.firefox.com in that process and forcing a log-in to a malicious Firefox Sync account. Preference settings that disable the sandbox are then synchronized to the local machine and the compromised browser would restart without the sandbox if a crash is triggered. This vulnerability affects Firefox ESR < 60.9, Firefox ESR < 68.1, and Firefox < 69.

CVSS3: 9.3
EPSS: Низкий
redhat логотип

CVE-2019-9812

около 6 лет назад

Given a compromised sandboxed content process due to a separate vulnerability, it is possible to escape that sandbox by loading accounts.firefox.com in that process and forcing a log-in to a malicious Firefox Sync account. Preference settings that disable the sandbox are then synchronized to the local machine and the compromised browser would restart without the sandbox if a crash is triggered. This vulnerability affects Firefox ESR < 60.9, Firefox ESR < 68.1, and Firefox < 69.

CVSS3: 9.3
EPSS: Низкий
nvd логотип

CVE-2019-9812

почти 6 лет назад

Given a compromised sandboxed content process due to a separate vulnerability, it is possible to escape that sandbox by loading accounts.firefox.com in that process and forcing a log-in to a malicious Firefox Sync account. Preference settings that disable the sandbox are then synchronized to the local machine and the compromised browser would restart without the sandbox if a crash is triggered. This vulnerability affects Firefox ESR < 60.9, Firefox ESR < 68.1, and Firefox < 69.

CVSS3: 9.3
EPSS: Низкий
debian логотип

CVE-2019-9812

почти 6 лет назад

Given a compromised sandboxed content process due to a separate vulner ...

CVSS3: 9.3
EPSS: Низкий
github логотип

GHSA-jh9w-r6qf-jxc5

больше 3 лет назад

Given a compromised sandboxed content process due to a separate vulnerability, it is possible to escape that sandbox by loading accounts.firefox.com in that process and forcing a log-in to a malicious Firefox Sync account. Preference settings that disable the sandbox are then synchronized to the local machine and the compromised browser would restart without the sandbox if a crash is triggered. This vulnerability affects Firefox ESR < 60.9, Firefox ESR < 68.1, and Firefox < 69.

CVSS3: 9.3
EPSS: Низкий
fstec логотип

BDU:2020-01411

почти 6 лет назад

Уязвимость компонента account.firefox.com веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю нарушить целостность данных или вызвать отказ в обслуживании

CVSS3: 9.3
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:2436-1

около 6 лет назад

Security update for MozillaFirefox

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:14173-1

около 6 лет назад

Security update for MozillaFirefox, firefox-glib2, firefox-gtk3

EPSS: Низкий
oracle-oval логотип

ELSA-2019-2729

около 6 лет назад

ELSA-2019-2729: firefox security update (CRITICAL)

EPSS: Низкий
oracle-oval логотип

ELSA-2019-2694

около 6 лет назад

ELSA-2019-2694: firefox security update (CRITICAL)

EPSS: Низкий
oracle-oval логотип

ELSA-2019-2663

около 6 лет назад

ELSA-2019-2663: firefox security update (CRITICAL)

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:2260-1

около 6 лет назад

Security update for MozillaFirefox

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:2251-1

около 6 лет назад

Security update for MozillaFirefox

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:2545-1

около 6 лет назад

Security update for MozillaFirefox

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:2620-1

около 6 лет назад

Security update for MozillaFirefox

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:14246-1

почти 6 лет назад

Security update for Mozilla Firefox

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2019-9812

Given a compromised sandboxed content process due to a separate vulnerability, it is possible to escape that sandbox by loading accounts.firefox.com in that process and forcing a log-in to a malicious Firefox Sync account. Preference settings that disable the sandbox are then synchronized to the local machine and the compromised browser would restart without the sandbox if a crash is triggered. This vulnerability affects Firefox ESR < 60.9, Firefox ESR < 68.1, and Firefox < 69.

CVSS3: 9.3
1%
Низкий
почти 6 лет назад
redhat логотип
CVE-2019-9812

Given a compromised sandboxed content process due to a separate vulnerability, it is possible to escape that sandbox by loading accounts.firefox.com in that process and forcing a log-in to a malicious Firefox Sync account. Preference settings that disable the sandbox are then synchronized to the local machine and the compromised browser would restart without the sandbox if a crash is triggered. This vulnerability affects Firefox ESR < 60.9, Firefox ESR < 68.1, and Firefox < 69.

CVSS3: 9.3
1%
Низкий
около 6 лет назад
nvd логотип
CVE-2019-9812

Given a compromised sandboxed content process due to a separate vulnerability, it is possible to escape that sandbox by loading accounts.firefox.com in that process and forcing a log-in to a malicious Firefox Sync account. Preference settings that disable the sandbox are then synchronized to the local machine and the compromised browser would restart without the sandbox if a crash is triggered. This vulnerability affects Firefox ESR < 60.9, Firefox ESR < 68.1, and Firefox < 69.

CVSS3: 9.3
1%
Низкий
почти 6 лет назад
debian логотип
CVE-2019-9812

Given a compromised sandboxed content process due to a separate vulner ...

CVSS3: 9.3
1%
Низкий
почти 6 лет назад
github логотип
GHSA-jh9w-r6qf-jxc5

Given a compromised sandboxed content process due to a separate vulnerability, it is possible to escape that sandbox by loading accounts.firefox.com in that process and forcing a log-in to a malicious Firefox Sync account. Preference settings that disable the sandbox are then synchronized to the local machine and the compromised browser would restart without the sandbox if a crash is triggered. This vulnerability affects Firefox ESR < 60.9, Firefox ESR < 68.1, and Firefox < 69.

CVSS3: 9.3
1%
Низкий
больше 3 лет назад
fstec логотип
BDU:2020-01411

Уязвимость компонента account.firefox.com веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю нарушить целостность данных или вызвать отказ в обслуживании

CVSS3: 9.3
1%
Низкий
почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:2436-1

Security update for MozillaFirefox

около 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:14173-1

Security update for MozillaFirefox, firefox-glib2, firefox-gtk3

около 6 лет назад
oracle-oval логотип
ELSA-2019-2729

ELSA-2019-2729: firefox security update (CRITICAL)

около 6 лет назад
oracle-oval логотип
ELSA-2019-2694

ELSA-2019-2694: firefox security update (CRITICAL)

около 6 лет назад
oracle-oval логотип
ELSA-2019-2663

ELSA-2019-2663: firefox security update (CRITICAL)

около 6 лет назад
suse-cvrf логотип
openSUSE-SU-2019:2260-1

Security update for MozillaFirefox

около 6 лет назад
suse-cvrf логотип
openSUSE-SU-2019:2251-1

Security update for MozillaFirefox

около 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:2545-1

Security update for MozillaFirefox

около 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:2620-1

Security update for MozillaFirefox

около 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:14246-1

Security update for Mozilla Firefox

почти 6 лет назад

Уязвимостей на страницу