Логотип exploitDog
product: "firefox"
Консоль
Логотип exploitDog

exploitDog

product: "firefox"

Количество 15 501

Количество 15 501

github логотип

GHSA-vcmf-vf48-7jqp

около 3 лет назад

The sourceMapURL feature in devtools was missing security checks that would have allowed a webpage to attempt to include local files or other files that should have been inaccessible. This vulnerability affects Firefox < 99.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-vc4r-c5fj-5mmm

больше 3 лет назад

When dragging content from the primary browser pane to the addressbar on a malicious site, it is possible to change the addressbar so that the displayed location following navigation does not match the URL of the newly loaded page. This allows for spoofing attacks. This vulnerability affects Firefox < 52.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-v9wp-mjxj-3vqc

больше 3 лет назад

Use-after-free vulnerability in the CanvasRenderingContext2D implementation in Mozilla Firefox before 40.0.3 and Firefox ESR 38.x before 38.2.1 allows remote attackers to execute arbitrary code by leveraging improper interaction between resize events and changes to Cascading Style Sheets (CSS) token sequences for a CANVAS element.

EPSS: Низкий
github логотип

GHSA-v9f2-7gjf-86f5

около 3 лет назад

Even when an iframe was sandboxed with <code>allow-top-navigation-by-user-activation</code>, if it received a redirect header to an external protocol the browser would process the redirect and prompt the user as appropriate. This vulnerability affects Firefox < 102.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-v973-q8fj-656q

почти 4 года назад

Mozilla Firefox 2.0.0.20 and earlier allows remote attackers to cause a denial of service (application crash) via nested calls to the window.print function, as demonstrated by a window.print(window.print()) in the onclick attribute of an INPUT element.

EPSS: Низкий
github логотип

GHSA-v8rx-7xrc-grgm

больше 3 лет назад

WebExtensions with the appropriate permissions can attach content scripts to Mozilla sites such as accounts.firefox.com and listen to network traffic to the site through the "webRequest" API. For example, this allows for the interception of username and an encrypted password during login to Firefox Accounts. This issue does not expose synchronization traffic directly and is limited to the process of user login to the website and the data displayed to the user once logged in. This vulnerability affects Firefox < 60.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-v88m-f4v8-vqc4

больше 3 лет назад

The reader view will display cross-origin content when CORS headers are set to prohibit the loading of cross-origin content by a site. This could allow access to content that should be restricted in reader view. This vulnerability affects Firefox < 58.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-v882-4x77-33qp

больше 3 лет назад

A use-after-free vulnerability can occur when the thread for a Web Worker is freed from memory prematurely instead of from memory in the main thread while cancelling fetch operations. This vulnerability affects Firefox < 58.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-v7w8-65gc-378f

больше 3 лет назад

In Reader View SameSite cookie protections are not checked on exiting. This allows for a payload to be triggered when Reader View is exited if loaded by a malicious site while Reader mode is active, bypassing CSRF protections. This vulnerability affects Firefox < 61.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-v7r3-hxvj-7w2p

3 месяца назад

Mitigation bypass in the DOM: Security component. This vulnerability affects Firefox < 145 and Firefox ESR < 140.5.

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-v7qx-gcjm-59m5

больше 2 лет назад

Due to URL previews in the network panel of developer tools improperly storing URLs, query parameters could potentially be used to overwrite global objects in privileged code. This vulnerability affects Firefox < 110.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-v7qw-fg65-g54w

больше 3 лет назад

Integer overflow in the stagefright::SampleTable::isValid function in libstagefright in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code via crafted MPEG-4 video data with H.264 encoding.

EPSS: Низкий
github логотип

GHSA-v78f-65qq-96m8

больше 3 лет назад

Improper refcounting of soft token session objects could cause a use-after-free and crash (likely limited to a denial of service). This vulnerability affects Firefox < 71.

EPSS: Низкий
github логотип

GHSA-v73x-jj5r-xff3

больше 3 лет назад

A use-after-free vulnerability can occur when the layer manager is freed too early when rendering specific SVG content, resulting in a potentially exploitable crash. This vulnerability affects Firefox < 55.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-v73h-33mh-g974

больше 3 лет назад

Use-after-free vulnerability in the mozilla::DataChannelConnection::Close function in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code by leveraging mishandling of WebRTC data-channel connections.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-v5ww-rww6-gq76

3 месяца назад

Incorrect boundary conditions in the Graphics: WebGPU component. This vulnerability affects Firefox < 145.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-v53r-6j66-5ch8

больше 3 лет назад

Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 do not ensure that the user approves the fullscreen and pointerlock settings, which allows remote attackers to cause a denial of service (UI outage), or conduct clickjacking or spoofing attacks, via a crafted web site.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-v4wj-h2ff-v79j

больше 3 лет назад

Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 22.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.

EPSS: Низкий
github логотип

GHSA-v4fq-jrv5-w6jf

больше 3 лет назад

The Math.random function in the JavaScript implementation in Mozilla Firefox 3.5.10 through 3.5.11, 3.6.4 through 3.6.8, and 4.0 Beta1 uses a random number generator that is seeded only once per document object, which makes it easier for remote attackers to track a user, or trick a user into acting upon a spoofed pop-up message, by calculating the seed value, related to a "temporary footprint" and an "in-session phishing attack." NOTE: this vulnerability exists because of an incorrect fix for CVE-2008-5913.

EPSS: Низкий
github логотип

GHSA-v49m-w8x3-qx4g

больше 3 лет назад

The SavedStacks class in the JavaScript implementation in Mozilla Firefox before 41.0, when the Debugger API is enabled, allows remote attackers to cause a denial of service (getSlotRef assertion failure and application exit) or possibly execute arbitrary code via a crafted web site.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-vcmf-vf48-7jqp

The sourceMapURL feature in devtools was missing security checks that would have allowed a webpage to attempt to include local files or other files that should have been inaccessible. This vulnerability affects Firefox < 99.

CVSS3: 6.5
0%
Низкий
около 3 лет назад
github логотип
GHSA-vc4r-c5fj-5mmm

When dragging content from the primary browser pane to the addressbar on a malicious site, it is possible to change the addressbar so that the displayed location following navigation does not match the URL of the newly loaded page. This allows for spoofing attacks. This vulnerability affects Firefox < 52.

CVSS3: 5.3
0%
Низкий
больше 3 лет назад
github логотип
GHSA-v9wp-mjxj-3vqc

Use-after-free vulnerability in the CanvasRenderingContext2D implementation in Mozilla Firefox before 40.0.3 and Firefox ESR 38.x before 38.2.1 allows remote attackers to execute arbitrary code by leveraging improper interaction between resize events and changes to Cascading Style Sheets (CSS) token sequences for a CANVAS element.

3%
Низкий
больше 3 лет назад
github логотип
GHSA-v9f2-7gjf-86f5

Even when an iframe was sandboxed with <code>allow-top-navigation-by-user-activation</code>, if it received a redirect header to an external protocol the browser would process the redirect and prompt the user as appropriate. This vulnerability affects Firefox < 102.

CVSS3: 6.1
0%
Низкий
около 3 лет назад
github логотип
GHSA-v973-q8fj-656q

Mozilla Firefox 2.0.0.20 and earlier allows remote attackers to cause a denial of service (application crash) via nested calls to the window.print function, as demonstrated by a window.print(window.print()) in the onclick attribute of an INPUT element.

3%
Низкий
почти 4 года назад
github логотип
GHSA-v8rx-7xrc-grgm

WebExtensions with the appropriate permissions can attach content scripts to Mozilla sites such as accounts.firefox.com and listen to network traffic to the site through the "webRequest" API. For example, this allows for the interception of username and an encrypted password during login to Firefox Accounts. This issue does not expose synchronization traffic directly and is limited to the process of user login to the website and the data displayed to the user once logged in. This vulnerability affects Firefox < 60.

CVSS3: 6.5
0%
Низкий
больше 3 лет назад
github логотип
GHSA-v88m-f4v8-vqc4

The reader view will display cross-origin content when CORS headers are set to prohibit the loading of cross-origin content by a site. This could allow access to content that should be restricted in reader view. This vulnerability affects Firefox < 58.

CVSS3: 5.3
0%
Низкий
больше 3 лет назад
github логотип
GHSA-v882-4x77-33qp

A use-after-free vulnerability can occur when the thread for a Web Worker is freed from memory prematurely instead of from memory in the main thread while cancelling fetch operations. This vulnerability affects Firefox < 58.

CVSS3: 9.8
2%
Низкий
больше 3 лет назад
github логотип
GHSA-v7w8-65gc-378f

In Reader View SameSite cookie protections are not checked on exiting. This allows for a payload to be triggered when Reader View is exited if loaded by a malicious site while Reader mode is active, bypassing CSRF protections. This vulnerability affects Firefox < 61.

CVSS3: 8.8
0%
Низкий
больше 3 лет назад
github логотип
GHSA-v7r3-hxvj-7w2p

Mitigation bypass in the DOM: Security component. This vulnerability affects Firefox < 145 and Firefox ESR < 140.5.

CVSS3: 8.1
0%
Низкий
3 месяца назад
github логотип
GHSA-v7qx-gcjm-59m5

Due to URL previews in the network panel of developer tools improperly storing URLs, query parameters could potentially be used to overwrite global objects in privileged code. This vulnerability affects Firefox < 110.

CVSS3: 8.8
0%
Низкий
больше 2 лет назад
github логотип
GHSA-v7qw-fg65-g54w

Integer overflow in the stagefright::SampleTable::isValid function in libstagefright in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code via crafted MPEG-4 video data with H.264 encoding.

2%
Низкий
больше 3 лет назад
github логотип
GHSA-v78f-65qq-96m8

Improper refcounting of soft token session objects could cause a use-after-free and crash (likely limited to a denial of service). This vulnerability affects Firefox < 71.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-v73x-jj5r-xff3

A use-after-free vulnerability can occur when the layer manager is freed too early when rendering specific SVG content, resulting in a potentially exploitable crash. This vulnerability affects Firefox < 55.

CVSS3: 7.5
2%
Низкий
больше 3 лет назад
github логотип
GHSA-v73h-33mh-g974

Use-after-free vulnerability in the mozilla::DataChannelConnection::Close function in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code by leveraging mishandling of WebRTC data-channel connections.

CVSS3: 9.8
2%
Низкий
больше 3 лет назад
github логотип
GHSA-v5ww-rww6-gq76

Incorrect boundary conditions in the Graphics: WebGPU component. This vulnerability affects Firefox < 145.

CVSS3: 9.8
0%
Низкий
3 месяца назад
github логотип
GHSA-v53r-6j66-5ch8

Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 do not ensure that the user approves the fullscreen and pointerlock settings, which allows remote attackers to cause a denial of service (UI outage), or conduct clickjacking or spoofing attacks, via a crafted web site.

CVSS3: 8.8
1%
Низкий
больше 3 лет назад
github логотип
GHSA-v4wj-h2ff-v79j

Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 22.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.

2%
Низкий
больше 3 лет назад
github логотип
GHSA-v4fq-jrv5-w6jf

The Math.random function in the JavaScript implementation in Mozilla Firefox 3.5.10 through 3.5.11, 3.6.4 through 3.6.8, and 4.0 Beta1 uses a random number generator that is seeded only once per document object, which makes it easier for remote attackers to track a user, or trick a user into acting upon a spoofed pop-up message, by calculating the seed value, related to a "temporary footprint" and an "in-session phishing attack." NOTE: this vulnerability exists because of an incorrect fix for CVE-2008-5913.

9%
Низкий
больше 3 лет назад
github логотип
GHSA-v49m-w8x3-qx4g

The SavedStacks class in the JavaScript implementation in Mozilla Firefox before 41.0, when the Debugger API is enabled, allows remote attackers to cause a denial of service (getSlotRef assertion failure and application exit) or possibly execute arbitrary code via a crafted web site.

1%
Низкий
больше 3 лет назад

Уязвимостей на страницу