Логотип exploitDog
product: "firefox"
Консоль
Логотип exploitDog

exploitDog

product: "firefox"

Количество 15 501

Количество 15 501

github логотип

GHSA-rr7w-29gf-6ffp

больше 3 лет назад

Use-after-free vulnerability in the mozilla::a11y::DocAccessible::ProcessInvalidationList function in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird < 45.4 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via an aria-owns attribute.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-rr56-xh92-q28g

больше 3 лет назад

Use-after-free vulnerability in the nsXULPopupManager::KeyDown function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows attackers to execute arbitrary code or cause a denial of service (heap memory corruption and application crash) by leveraging keyboard access to use the Alt key during selection of top-level menu items.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-rr24-wwr3-8ppx

почти 4 года назад

Race condition in Mozilla Firefox allows remote attackers to produce a JavaScript message with a spoofed domain association by writing the message in between the document request and document load for a web page in a different domain.

EPSS: Низкий
github логотип

GHSA-rqmx-jjch-gmgj

больше 1 года назад

Multiple WebRTC threads could have claimed a newly connected audio input leading to use-after-free. This vulnerability affects Firefox < 126.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-rpf5-xpfp-546f

больше 3 лет назад

When Private Browsing mode is used, it is possible for a web worker to write persistent data to IndexedDB and fingerprint a user uniquely. IndexedDB should not be available in Private Browsing mode and this stored data will persist across multiple private browsing mode sessions because it is not cleared when exiting. This vulnerability affects Firefox ESR < 52.5.2 and Firefox < 57.0.1.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-rp8c-4xv6-27j8

больше 2 лет назад

The session restore helper crashed whenever there was no parameter sent to the message handler. This vulnerability affects Firefox for iOS < 115.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-rp4p-cp68-c8c4

больше 3 лет назад

The WebChannel.jsm module in Mozilla Firefox before 38.0 allows remote attackers to bypass the Same Origin Policy and obtain sensitive webchannel-response data via a crafted web site containing an IFRAME element referencing a different web site that is intended to read this data.

EPSS: Низкий
github логотип

GHSA-rmgx-g94r-75jg

больше 2 лет назад

A bug in popup notifications delay calculation could have made it possible for an attacker to trick a user into granting permissions. This vulnerability affects Firefox < 116, Firefox ESR < 102.14, and Firefox ESR < 115.1.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-rm3j-9j4x-mr94

больше 2 лет назад

When following a redirect to a publicly accessible web extension file, the URL may have been translated to the actual local path, leaking potentially sensitive information. This vulnerability affects Firefox < 111.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-rj59-6cjh-fxcf

больше 2 лет назад

In some cases, an untrusted input stream was copied to a stack buffer without checking its size. This resulted in a potentially exploitable crash which could have led to a sandbox escape. This vulnerability affects Firefox < 116, Firefox ESR < 102.14, and Firefox ESR < 115.1.

CVSS3: 7.5
EPSS: Средний
github логотип

GHSA-rj4h-3hm7-277q

больше 3 лет назад

An issue where a "<select>" dropdown menu can be used to cover location bar content, resulting in potential spoofing attacks. This attack requires e10s to be enabled in order to function. This vulnerability affects Firefox < 50.

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-rhrh-2gjf-7xqf

больше 3 лет назад

A compromised content process could have performed session history manipulations it should not have been able to due to testing infrastructure that was not restricted to testing-only configurations. This vulnerability affects Firefox < 88.

EPSS: Низкий
github логотип

GHSA-rhrf-cx66-4xf3

больше 3 лет назад

The AES-GCM implementation in WebCrypto API accepts 0-length IV when it should require a length of 1 according to the NIST Special Publication 800-38D specification. This might allow for the authentication key to be determined in some instances. This vulnerability affects Firefox < 56.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-rhh8-vf3p-5mx3

около 3 лет назад

Mozilla developers Gabriele Svelto, Yulia Startsev, Andrew McCreight and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 106. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.<br />*Note*: This advisory was added on December 13th, 2022 after discovering it was inadvertently left out of the original advisory. The fix was included in the original release of Firefox 107. This vulnerability affects Firefox < 107.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-rh2c-qhcf-wg9r

больше 3 лет назад

On Windows systems, if non-null-terminated strings are copied into the crash reporter for some specific registry keys, stack memory data can be copied until a null is found. This can potentially contain private data from the local system. Note: This attack only affects Windows operating systems. Other operating systems are not affected. This vulnerability affects Firefox < 55.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-rg9q-8758-m38f

больше 3 лет назад

Mozilla Firefox before 28.0 on Android allows remote attackers to bypass the Same Origin Policy and access arbitrary file: URLs via vectors involving the "Open Link in New Tab" menu selection.

EPSS: Низкий
github логотип

GHSA-rg79-6j3q-wm5h

больше 3 лет назад

A vulnerability where WebExtensions can download and attempt to open a file of some non-executable file types. This can be triggered without specific user interaction for the file download and open actions. This could be used to trigger known vulnerabilities in the programs that handle those document types. This vulnerability affects Firefox < 56.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-rfmr-q5xq-hg6g

больше 3 лет назад

The New Tab page in Mozilla Firefox before 17.0 uses a privileged context for execution of JavaScript code by bookmarklets, which allows user-assisted remote attackers to run arbitrary programs by leveraging a javascript: URL in a bookmark.

EPSS: Низкий
github логотип

GHSA-rf7w-ph3q-57v5

больше 3 лет назад

Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 46.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-rf72-xhmw-2xvx

больше 3 лет назад

Mozilla developers reported memory safety bugs present in Firefox 70. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 71.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-rr7w-29gf-6ffp

Use-after-free vulnerability in the mozilla::a11y::DocAccessible::ProcessInvalidationList function in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird < 45.4 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via an aria-owns attribute.

CVSS3: 9.8
2%
Низкий
больше 3 лет назад
github логотип
GHSA-rr56-xh92-q28g

Use-after-free vulnerability in the nsXULPopupManager::KeyDown function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows attackers to execute arbitrary code or cause a denial of service (heap memory corruption and application crash) by leveraging keyboard access to use the Alt key during selection of top-level menu items.

CVSS3: 9.8
2%
Низкий
больше 3 лет назад
github логотип
GHSA-rr24-wwr3-8ppx

Race condition in Mozilla Firefox allows remote attackers to produce a JavaScript message with a spoofed domain association by writing the message in between the document request and document load for a web page in a different domain.

0%
Низкий
почти 4 года назад
github логотип
GHSA-rqmx-jjch-gmgj

Multiple WebRTC threads could have claimed a newly connected audio input leading to use-after-free. This vulnerability affects Firefox < 126.

CVSS3: 9.8
1%
Низкий
больше 1 года назад
github логотип
GHSA-rpf5-xpfp-546f

When Private Browsing mode is used, it is possible for a web worker to write persistent data to IndexedDB and fingerprint a user uniquely. IndexedDB should not be available in Private Browsing mode and this stored data will persist across multiple private browsing mode sessions because it is not cleared when exiting. This vulnerability affects Firefox ESR < 52.5.2 and Firefox < 57.0.1.

CVSS3: 7.5
1%
Низкий
больше 3 лет назад
github логотип
GHSA-rp8c-4xv6-27j8

The session restore helper crashed whenever there was no parameter sent to the message handler. This vulnerability affects Firefox for iOS < 115.

CVSS3: 6.5
1%
Низкий
больше 2 лет назад
github логотип
GHSA-rp4p-cp68-c8c4

The WebChannel.jsm module in Mozilla Firefox before 38.0 allows remote attackers to bypass the Same Origin Policy and obtain sensitive webchannel-response data via a crafted web site containing an IFRAME element referencing a different web site that is intended to read this data.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-rmgx-g94r-75jg

A bug in popup notifications delay calculation could have made it possible for an attacker to trick a user into granting permissions. This vulnerability affects Firefox < 116, Firefox ESR < 102.14, and Firefox ESR < 115.1.

CVSS3: 8.8
1%
Низкий
больше 2 лет назад
github логотип
GHSA-rm3j-9j4x-mr94

When following a redirect to a publicly accessible web extension file, the URL may have been translated to the actual local path, leaking potentially sensitive information. This vulnerability affects Firefox < 111.

CVSS3: 6.5
0%
Низкий
больше 2 лет назад
github логотип
GHSA-rj59-6cjh-fxcf

In some cases, an untrusted input stream was copied to a stack buffer without checking its size. This resulted in a potentially exploitable crash which could have led to a sandbox escape. This vulnerability affects Firefox < 116, Firefox ESR < 102.14, and Firefox ESR < 115.1.

CVSS3: 7.5
10%
Средний
больше 2 лет назад
github логотип
GHSA-rj4h-3hm7-277q

An issue where a "<select>" dropdown menu can be used to cover location bar content, resulting in potential spoofing attacks. This attack requires e10s to be enabled in order to function. This vulnerability affects Firefox < 50.

CVSS3: 5.9
1%
Низкий
больше 3 лет назад
github логотип
GHSA-rhrh-2gjf-7xqf

A compromised content process could have performed session history manipulations it should not have been able to due to testing infrastructure that was not restricted to testing-only configurations. This vulnerability affects Firefox < 88.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-rhrf-cx66-4xf3

The AES-GCM implementation in WebCrypto API accepts 0-length IV when it should require a length of 1 according to the NIST Special Publication 800-38D specification. This might allow for the authentication key to be determined in some instances. This vulnerability affects Firefox < 56.

CVSS3: 5.3
1%
Низкий
больше 3 лет назад
github логотип
GHSA-rhh8-vf3p-5mx3

Mozilla developers Gabriele Svelto, Yulia Startsev, Andrew McCreight and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 106. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.<br />*Note*: This advisory was added on December 13th, 2022 after discovering it was inadvertently left out of the original advisory. The fix was included in the original release of Firefox 107. This vulnerability affects Firefox < 107.

CVSS3: 8.8
1%
Низкий
около 3 лет назад
github логотип
GHSA-rh2c-qhcf-wg9r

On Windows systems, if non-null-terminated strings are copied into the crash reporter for some specific registry keys, stack memory data can be copied until a null is found. This can potentially contain private data from the local system. Note: This attack only affects Windows operating systems. Other operating systems are not affected. This vulnerability affects Firefox < 55.

CVSS3: 7.5
0%
Низкий
больше 3 лет назад
github логотип
GHSA-rg9q-8758-m38f

Mozilla Firefox before 28.0 on Android allows remote attackers to bypass the Same Origin Policy and access arbitrary file: URLs via vectors involving the "Open Link in New Tab" menu selection.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-rg79-6j3q-wm5h

A vulnerability where WebExtensions can download and attempt to open a file of some non-executable file types. This can be triggered without specific user interaction for the file download and open actions. This could be used to trigger known vulnerabilities in the programs that handle those document types. This vulnerability affects Firefox < 56.

CVSS3: 9.8
3%
Низкий
больше 3 лет назад
github логотип
GHSA-rfmr-q5xq-hg6g

The New Tab page in Mozilla Firefox before 17.0 uses a privileged context for execution of JavaScript code by bookmarklets, which allows user-assisted remote attackers to run arbitrary programs by leveraging a javascript: URL in a bookmark.

2%
Низкий
больше 3 лет назад
github логотип
GHSA-rf7w-ph3q-57v5

Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 46.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.

CVSS3: 8.8
1%
Низкий
больше 3 лет назад
github логотип
GHSA-rf72-xhmw-2xvx

Mozilla developers reported memory safety bugs present in Firefox 70. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 71.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу