Логотип exploitDog
product: "firefox"
Консоль
Логотип exploitDog

exploitDog

product: "firefox"

Количество 15 501

Количество 15 501

github логотип

GHSA-v46q-vx2w-v2mw

больше 3 лет назад

The InitTextures function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.

EPSS: Низкий
github логотип

GHSA-v3vw-x43v-2399

почти 4 года назад

feedWriter in Mozilla Firefox before 2.0.0.17 allows remote attackers to execute scripts with chrome privileges via vectors related to feed preview and the (1) elem.doCommand, (2) elem.dispatchEvent, (3) _setTitleText, (4) _setTitleImage, and (5) _initSubscriptionUI functions.

EPSS: Низкий
github логотип

GHSA-v3v8-99w9-8c5h

около 1 года назад

Opening Javascript links in a new tab via long-press in the Firefox iOS client could result in a malicious script spoofing the URL of the new tab. This vulnerability affects Firefox for iOS < 134.

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-v3f8-p9hj-32cj

больше 3 лет назад

The Mozilla Windows updater modifies some files to be updated by reading the original file and applying changes to it. The location of the original file can be altered by a malicious user by passing a special path to the callback parameter through the Mozilla Maintenance Service, allowing the manipulation of files in the installation directory and privilege escalation by manipulating the Mozilla Maintenance Service, which has privileged access. Note: This attack requires local system access and only affects Windows. Other operating systems are not affected. This vulnerability affects Firefox ESR < 52.2 and Firefox < 54.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-v2mv-7r3m-v2g8

больше 3 лет назад

Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 33.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to improper interaction between threading and garbage collection in the GCRuntime::triggerGC function in js/src/jsgc.cpp, and unknown other vectors.

EPSS: Низкий
github логотип

GHSA-v2jp-3gq5-h2jm

больше 3 лет назад

The watch implementation in the JavaScript engine in Mozilla Firefox before 46.0, Firefox ESR 38.x before 38.8, and Firefox ESR 45.x before 45.1 allows remote attackers to execute arbitrary code or cause a denial of service (generation-count overflow, out-of-bounds HashMap write access, and application crash) via a crafted web site.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-v2j8-2q45-8jcq

больше 1 года назад

A specially crafted filename containing a large number of spaces could obscure the file's extension when displayed in the download dialog. *This bug only affects Firefox for Android. Other versions of Firefox are unaffected.* This vulnerability affects Firefox < 131.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-v2fg-9ph4-5293

около 4 лет назад

When parsing internationalized domain names, high bits of the characters in the URLs were sometimes stripped, resulting in inconsistencies that could lead to user confusion or attacks such as phishing. This vulnerability affects Firefox < 94.

EPSS: Низкий
github логотип

GHSA-v2f4-j72x-qfx5

больше 2 лет назад

The return value from `gfx::SourceSurfaceSkia::Map()` wasn't being verified which could have potentially lead to a null pointer dereference. This vulnerability affects Firefox < 110.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-v254-2gqm-j372

больше 3 лет назад

Due to unexpected data type conversions, a use-after-free could have occurred when interacting with the font cache. We presume that with enough effort this could have been exploited to run arbitrary code. This vulnerability affects Firefox < 88.

EPSS: Низкий
github логотип

GHSA-v22c-c5cc-5mv4

больше 3 лет назад

An out-of-bounds write in "ClearKeyDecryptor" while decrypting some Clearkey-encrypted media content. The "ClearKeyDecryptor" code runs within the Gecko Media Plugin (GMP) sandbox. If a second mechanism is found to escape the sandbox, this vulnerability allows for the writing of arbitrary data within memory, resulting in a potentially exploitable crash. This vulnerability affects Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.

CVSS3: 8.6
EPSS: Низкий
github логотип

GHSA-rx9c-3qcp-h267

больше 3 лет назад

Race condition in the GetStaticInstance function in the WebRTC implementation in Mozilla Firefox before 45.0 might allow remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via unspecified vectors.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-rwvw-c2vw-6c39

больше 3 лет назад

Integer overflow in the mozilla::layers::BufferTextureClient::AllocateForSurface function in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 allows remote attackers to execute arbitrary code by triggering a graphics operation that requires a large texture allocation.

EPSS: Низкий
github логотип

GHSA-rwgx-gvrc-xv45

больше 3 лет назад

Mozilla Firefox before 49.0 allows user-assisted remote attackers to obtain sensitive full-pathname information during a local-file drag-and-drop operation via crafted JavaScript code.

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-rwcr-6886-9vfq

больше 1 года назад

When a network error occurred during page load, the prior content could have remained in view with a blank URL bar. This could have been used to obfuscate a spoofed web site. This vulnerability affects Firefox < 126.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-rw88-vh2c-q47r

больше 3 лет назад

When a new protocol handler is registered, the API accepts a title argument which can be used to mislead users about which domain is registering the new protocol. This may result in the user approving a protocol handler that they otherwise would not have. This vulnerability affects Firefox < 63.

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-rw7w-hjmw-gj5r

больше 3 лет назад

The Updater in Mozilla Firefox before 48.0 on Windows allows local users to write to arbitrary files via vectors involving the callback application-path parameter and a hard link.

CVSS3: 4.7
EPSS: Низкий
github логотип

GHSA-rvgp-cj49-43c7

больше 3 лет назад

If a site is loaded over a HTTPS connection but loads a favicon resource over HTTP, the mixed content warning is not displayed to users. This vulnerability affects Firefox < 63.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-rrwm-vm8h-54hm

больше 3 лет назад

The debugger in the developer-tools subsystem in Mozilla Firefox before 15.0, when remote debugging is disabled, does not properly restrict access to the remote-debugging service, which allows remote attackers to execute arbitrary code by leveraging the presence of the HTTPMonitor extension and connecting to that service through the HTTPMonitor port.

EPSS: Низкий
github логотип

GHSA-rrwf-mrcc-mrgc

почти 4 года назад

Mozilla Firefox 3.0.8 and earlier 3.0.x versions allows remote attackers to cause a denial of service (memory corruption) via an XML document composed of a long series of start-tags with no corresponding end-tags. NOTE: it was later reported that 3.0.10 and earlier are also affected.

EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-v46q-vx2w-v2mw

The InitTextures function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.

3%
Низкий
больше 3 лет назад
github логотип
GHSA-v3vw-x43v-2399

feedWriter in Mozilla Firefox before 2.0.0.17 allows remote attackers to execute scripts with chrome privileges via vectors related to feed preview and the (1) elem.doCommand, (2) elem.dispatchEvent, (3) _setTitleText, (4) _setTitleImage, and (5) _initSubscriptionUI functions.

3%
Низкий
почти 4 года назад
github логотип
GHSA-v3v8-99w9-8c5h

Opening Javascript links in a new tab via long-press in the Firefox iOS client could result in a malicious script spoofing the URL of the new tab. This vulnerability affects Firefox for iOS < 134.

CVSS3: 4.3
0%
Низкий
около 1 года назад
github логотип
GHSA-v3f8-p9hj-32cj

The Mozilla Windows updater modifies some files to be updated by reading the original file and applying changes to it. The location of the original file can be altered by a malicious user by passing a special path to the callback parameter through the Mozilla Maintenance Service, allowing the manipulation of files in the installation directory and privilege escalation by manipulating the Mozilla Maintenance Service, which has privileged access. Note: This attack requires local system access and only affects Windows. Other operating systems are not affected. This vulnerability affects Firefox ESR < 52.2 and Firefox < 54.

CVSS3: 7.8
0%
Низкий
больше 3 лет назад
github логотип
GHSA-v2mv-7r3m-v2g8

Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 33.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to improper interaction between threading and garbage collection in the GCRuntime::triggerGC function in js/src/jsgc.cpp, and unknown other vectors.

2%
Низкий
больше 3 лет назад
github логотип
GHSA-v2jp-3gq5-h2jm

The watch implementation in the JavaScript engine in Mozilla Firefox before 46.0, Firefox ESR 38.x before 38.8, and Firefox ESR 45.x before 45.1 allows remote attackers to execute arbitrary code or cause a denial of service (generation-count overflow, out-of-bounds HashMap write access, and application crash) via a crafted web site.

CVSS3: 7.5
1%
Низкий
больше 3 лет назад
github логотип
GHSA-v2j8-2q45-8jcq

A specially crafted filename containing a large number of spaces could obscure the file's extension when displayed in the download dialog. *This bug only affects Firefox for Android. Other versions of Firefox are unaffected.* This vulnerability affects Firefox < 131.

CVSS3: 5.3
0%
Низкий
больше 1 года назад
github логотип
GHSA-v2fg-9ph4-5293

When parsing internationalized domain names, high bits of the characters in the URLs were sometimes stripped, resulting in inconsistencies that could lead to user confusion or attacks such as phishing. This vulnerability affects Firefox < 94.

0%
Низкий
около 4 лет назад
github логотип
GHSA-v2f4-j72x-qfx5

The return value from `gfx::SourceSurfaceSkia::Map()` wasn't being verified which could have potentially lead to a null pointer dereference. This vulnerability affects Firefox < 110.

CVSS3: 7.5
0%
Низкий
больше 2 лет назад
github логотип
GHSA-v254-2gqm-j372

Due to unexpected data type conversions, a use-after-free could have occurred when interacting with the font cache. We presume that with enough effort this could have been exploited to run arbitrary code. This vulnerability affects Firefox < 88.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-v22c-c5cc-5mv4

An out-of-bounds write in "ClearKeyDecryptor" while decrypting some Clearkey-encrypted media content. The "ClearKeyDecryptor" code runs within the Gecko Media Plugin (GMP) sandbox. If a second mechanism is found to escape the sandbox, this vulnerability allows for the writing of arbitrary data within memory, resulting in a potentially exploitable crash. This vulnerability affects Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.

CVSS3: 8.6
1%
Низкий
больше 3 лет назад
github логотип
GHSA-rx9c-3qcp-h267

Race condition in the GetStaticInstance function in the WebRTC implementation in Mozilla Firefox before 45.0 might allow remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via unspecified vectors.

CVSS3: 8.8
1%
Низкий
больше 3 лет назад
github логотип
GHSA-rwvw-c2vw-6c39

Integer overflow in the mozilla::layers::BufferTextureClient::AllocateForSurface function in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 allows remote attackers to execute arbitrary code by triggering a graphics operation that requires a large texture allocation.

2%
Низкий
больше 3 лет назад
github логотип
GHSA-rwgx-gvrc-xv45

Mozilla Firefox before 49.0 allows user-assisted remote attackers to obtain sensitive full-pathname information during a local-file drag-and-drop operation via crafted JavaScript code.

CVSS3: 4.3
0%
Низкий
больше 3 лет назад
github логотип
GHSA-rwcr-6886-9vfq

When a network error occurred during page load, the prior content could have remained in view with a blank URL bar. This could have been used to obfuscate a spoofed web site. This vulnerability affects Firefox < 126.

CVSS3: 7.5
0%
Низкий
больше 1 года назад
github логотип
GHSA-rw88-vh2c-q47r

When a new protocol handler is registered, the API accepts a title argument which can be used to mislead users about which domain is registering the new protocol. This may result in the user approving a protocol handler that they otherwise would not have. This vulnerability affects Firefox < 63.

CVSS3: 4.3
0%
Низкий
больше 3 лет назад
github логотип
GHSA-rw7w-hjmw-gj5r

The Updater in Mozilla Firefox before 48.0 on Windows allows local users to write to arbitrary files via vectors involving the callback application-path parameter and a hard link.

CVSS3: 4.7
0%
Низкий
больше 3 лет назад
github логотип
GHSA-rvgp-cj49-43c7

If a site is loaded over a HTTPS connection but loads a favicon resource over HTTP, the mixed content warning is not displayed to users. This vulnerability affects Firefox < 63.

CVSS3: 5.3
1%
Низкий
больше 3 лет назад
github логотип
GHSA-rrwm-vm8h-54hm

The debugger in the developer-tools subsystem in Mozilla Firefox before 15.0, when remote debugging is disabled, does not properly restrict access to the remote-debugging service, which allows remote attackers to execute arbitrary code by leveraging the presence of the HTTPMonitor extension and connecting to that service through the HTTPMonitor port.

3%
Низкий
больше 3 лет назад
github логотип
GHSA-rrwf-mrcc-mrgc

Mozilla Firefox 3.0.8 and earlier 3.0.x versions allows remote attackers to cause a denial of service (memory corruption) via an XML document composed of a long series of start-tags with no corresponding end-tags. NOTE: it was later reported that 3.0.10 and earlier are also affected.

17%
Средний
почти 4 года назад

Уязвимостей на страницу