Логотип exploitDog
product: "firefox"
Консоль
Логотип exploitDog

exploitDog

product: "firefox"

Количество 14 599

Количество 14 599

github логотип

GHSA-xmm2-x5jc-rvmh

11 месяцев назад

Long pressing on a download link could potentially provide a means for cross-site scripting This vulnerability affects Firefox for iOS < 129.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-xmh3-55xm-hpg9

около 3 лет назад

An attack can use a blob URL and script to spoof an arbitrary addressbar URL prefaced by "blob:" as the protocol, leading to user confusion and further spoofing attacks. This vulnerability affects Firefox < 52.

CVSS3: 5.3
EPSS: Средний
github логотип

GHSA-xmc5-26p9-v4x6

около 3 лет назад

WebExtensions could use the "mozAddonManager" API by modifying the CSP headers on sites with the appropriate permissions and then using host requests to redirect script loads to a malicious site. This allows a malicious extension to then install additional extensions without explicit user permission. This vulnerability affects Firefox < 51.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-xj5m-432r-gpqm

около 3 лет назад

The fetch API implementation in Mozilla Firefox before 41.0.2 does not restrict access to the HTTP response body in certain situations where user credentials are supplied but the CORS cross-origin request algorithm is improperly followed, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.

EPSS: Низкий
github логотип

GHSA-xhfv-25pm-fp3g

около 3 лет назад

Mozilla Firefox before 39.0 on OS X includes native key press information during the logging of crashes, which allows remote attackers to obtain sensitive information by leveraging access to a crash-reporting data stream.

EPSS: Низкий
github логотип

GHSA-xh4q-pv2r-82c7

около 3 лет назад

Mozilla Firefox 1.5.0.3 allows remote attackers to cause a denial of service via a web page with a large number of IMG elements in which the SRC attribute is a mailto URI. NOTE: another researcher found that the web page caused a temporary browser slowdown instead of a crash.

EPSS: Низкий
github логотип

GHSA-xgvx-m8xh-737m

около 3 лет назад

The DOMParser API did not properly process '<noscript>' elements for escaping. This could be used as an mXSS vector to bypass an HTML Sanitizer. This vulnerability affects Firefox < 86.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-xg8q-ggjx-6hx2

23 дня назад

A clickjacking vulnerability could have been used to trick a user into leaking saved payment card details to a malicious page. This vulnerability affects Firefox < 139 and Firefox ESR < 128.11.

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-xg4r-c4j2-fcj4

около 3 лет назад

Punycode format text will be displayed for entire qualified international domain names in some instances when a sub-domain triggers the punycode display instead of the primary domain being displayed in native script and the sub-domain only displaying as punycode. This could be used for limited spoofing attacks due to user confusion. This vulnerability affects Firefox < 57.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-xfhf-q7xr-xpw6

около 3 лет назад

A buffer overflow in SkiaGl caused when a GrGLBuffer is truncated during allocation. Later writers will overflow the buffer, resulting in a potentially exploitable crash. This vulnerability affects Firefox < 50.1.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-xf5w-2jf5-86c8

около 3 лет назад

WebExtensions can use request redirection and a "filterReponseData" filter to bypass host permission settings to redirect network traffic and access content from a host for which they do not have explicit user permission. This vulnerability affects Firefox < 60.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-xf23-357c-2vmh

около 3 лет назад

Mozilla Firefox before 35.0 on Windows allows remote attackers to bypass the Gecko Media Plugin (GMP) sandbox protection mechanism by leveraging access to the GMP process, as demonstrated by the OpenH264 plugin's process.

EPSS: Низкий
github логотип

GHSA-xcgp-vxv9-g7g2

около 3 лет назад

The getUserMedia permission implementation in Mozilla Firefox before 22.0 references the URL of a top-level document instead of the URL of a specific page, which makes it easier for remote attackers to trick users into permitting camera or microphone access via a crafted web site that uses IFRAME elements.

EPSS: Низкий
github логотип

GHSA-xc8j-mr73-m6wv

около 1 года назад

In certain cases the JIT incorrectly optimized MSubstr operations, which led to out-of-bounds reads. This vulnerability affects Firefox < 125.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-x945-jm33-f3qv

около 1 года назад

Dragging Javascript URLs to the address bar could cause them to be loaded, bypassing restrictions and security protections This vulnerability affects Firefox for iOS < 124.

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-x8v2-79v9-cjv2

около 3 лет назад

Use-after-free vulnerability in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 allows remote attackers to execute arbitrary code by triggering attempted use of a data channel that has been closed by a WebRTC function.

EPSS: Низкий
github логотип

GHSA-x8mw-7jxq-c26v

около 3 лет назад

Mozilla developers and community members reported memory safety bugs present in Firefox 66. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 67.

EPSS: Низкий
github логотип

GHSA-x85x-whmj-686x

около 3 лет назад

Unsanitized output in the browser UI leaves HTML tags in place and can result in arbitrary code execution in Firefox before version 58.0.1.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-x7x8-qh7j-2q6h

больше 2 лет назад

When clicking on a tel: link, USSD codes, specified after a <code>\*</code> character, would be included in the phone number. On certain phones, or on certain carriers, if the number was dialed this could perform actions on a user's account, similar to a cross-site request forgery attack.<br>*This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 97.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-x73f-6qwm-hh3x

больше 1 года назад

A compromised content process could have updated the document URI. This could have allowed an attacker to set an arbitrary URI in the address bar or history. This vulnerability affects Firefox < 122.

CVSS3: 4.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-xmm2-x5jc-rvmh

Long pressing on a download link could potentially provide a means for cross-site scripting This vulnerability affects Firefox for iOS < 129.

CVSS3: 6.1
0%
Низкий
11 месяцев назад
github логотип
GHSA-xmh3-55xm-hpg9

An attack can use a blob URL and script to spoof an arbitrary addressbar URL prefaced by "blob:" as the protocol, leading to user confusion and further spoofing attacks. This vulnerability affects Firefox < 52.

CVSS3: 5.3
35%
Средний
около 3 лет назад
github логотип
GHSA-xmc5-26p9-v4x6

WebExtensions could use the "mozAddonManager" API by modifying the CSP headers on sites with the appropriate permissions and then using host requests to redirect script loads to a malicious site. This allows a malicious extension to then install additional extensions without explicit user permission. This vulnerability affects Firefox < 51.

CVSS3: 6.1
0%
Низкий
около 3 лет назад
github логотип
GHSA-xj5m-432r-gpqm

The fetch API implementation in Mozilla Firefox before 41.0.2 does not restrict access to the HTTP response body in certain situations where user credentials are supplied but the CORS cross-origin request algorithm is improperly followed, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.

0%
Низкий
около 3 лет назад
github логотип
GHSA-xhfv-25pm-fp3g

Mozilla Firefox before 39.0 on OS X includes native key press information during the logging of crashes, which allows remote attackers to obtain sensitive information by leveraging access to a crash-reporting data stream.

1%
Низкий
около 3 лет назад
github логотип
GHSA-xh4q-pv2r-82c7

Mozilla Firefox 1.5.0.3 allows remote attackers to cause a denial of service via a web page with a large number of IMG elements in which the SRC attribute is a mailto URI. NOTE: another researcher found that the web page caused a temporary browser slowdown instead of a crash.

1%
Низкий
около 3 лет назад
github логотип
GHSA-xgvx-m8xh-737m

The DOMParser API did not properly process '<noscript>' elements for escaping. This could be used as an mXSS vector to bypass an HTML Sanitizer. This vulnerability affects Firefox < 86.

CVSS3: 6.1
0%
Низкий
около 3 лет назад
github логотип
GHSA-xg8q-ggjx-6hx2

A clickjacking vulnerability could have been used to trick a user into leaking saved payment card details to a malicious page. This vulnerability affects Firefox < 139 and Firefox ESR < 128.11.

CVSS3: 5.4
0%
Низкий
23 дня назад
github логотип
GHSA-xg4r-c4j2-fcj4

Punycode format text will be displayed for entire qualified international domain names in some instances when a sub-domain triggers the punycode display instead of the primary domain being displayed in native script and the sub-domain only displaying as punycode. This could be used for limited spoofing attacks due to user confusion. This vulnerability affects Firefox < 57.

CVSS3: 5.3
1%
Низкий
около 3 лет назад
github логотип
GHSA-xfhf-q7xr-xpw6

A buffer overflow in SkiaGl caused when a GrGLBuffer is truncated during allocation. Later writers will overflow the buffer, resulting in a potentially exploitable crash. This vulnerability affects Firefox < 50.1.

CVSS3: 7.5
3%
Низкий
около 3 лет назад
github логотип
GHSA-xf5w-2jf5-86c8

WebExtensions can use request redirection and a "filterReponseData" filter to bypass host permission settings to redirect network traffic and access content from a host for which they do not have explicit user permission. This vulnerability affects Firefox < 60.

CVSS3: 7.5
1%
Низкий
около 3 лет назад
github логотип
GHSA-xf23-357c-2vmh

Mozilla Firefox before 35.0 on Windows allows remote attackers to bypass the Gecko Media Plugin (GMP) sandbox protection mechanism by leveraging access to the GMP process, as demonstrated by the OpenH264 plugin's process.

1%
Низкий
около 3 лет назад
github логотип
GHSA-xcgp-vxv9-g7g2

The getUserMedia permission implementation in Mozilla Firefox before 22.0 references the URL of a top-level document instead of the URL of a specific page, which makes it easier for remote attackers to trick users into permitting camera or microphone access via a crafted web site that uses IFRAME elements.

0%
Низкий
около 3 лет назад
github логотип
GHSA-xc8j-mr73-m6wv

In certain cases the JIT incorrectly optimized MSubstr operations, which led to out-of-bounds reads. This vulnerability affects Firefox < 125.

CVSS3: 6.5
0%
Низкий
около 1 года назад
github логотип
GHSA-x945-jm33-f3qv

Dragging Javascript URLs to the address bar could cause them to be loaded, bypassing restrictions and security protections This vulnerability affects Firefox for iOS < 124.

CVSS3: 4.3
0%
Низкий
около 1 года назад
github логотип
GHSA-x8v2-79v9-cjv2

Use-after-free vulnerability in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 allows remote attackers to execute arbitrary code by triggering attempted use of a data channel that has been closed by a WebRTC function.

2%
Низкий
около 3 лет назад
github логотип
GHSA-x8mw-7jxq-c26v

Mozilla developers and community members reported memory safety bugs present in Firefox 66. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 67.

1%
Низкий
около 3 лет назад
github логотип
GHSA-x85x-whmj-686x

Unsanitized output in the browser UI leaves HTML tags in place and can result in arbitrary code execution in Firefox before version 58.0.1.

CVSS3: 6.1
1%
Низкий
около 3 лет назад
github логотип
GHSA-x7x8-qh7j-2q6h

When clicking on a tel: link, USSD codes, specified after a <code>\*</code> character, would be included in the phone number. On certain phones, or on certain carriers, if the number was dialed this could perform actions on a user's account, similar to a cross-site request forgery attack.<br>*This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 97.

CVSS3: 8.8
0%
Низкий
больше 2 лет назад
github логотип
GHSA-x73f-6qwm-hh3x

A compromised content process could have updated the document URI. This could have allowed an attacker to set an arbitrary URI in the address bar or history. This vulnerability affects Firefox < 122.

CVSS3: 4.3
0%
Низкий
больше 1 года назад

Уязвимостей на страницу