Логотип exploitDog
product: "firefox"
Консоль
Логотип exploitDog

exploitDog

product: "firefox"

Количество 15 501

Количество 15 501

github логотип

GHSA-qqvm-q62q-qw92

больше 3 лет назад

Content Security Policy (CSP) is not applied correctly to all parts of multipart content sent with the "multipart/x-mixed-replace" MIME type. This could allow for script to run where CSP should block it, allowing for cross-site scripting (XSS) and other attacks. This vulnerability affects Firefox < 60.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-qqhw-rv6h-rvpx

почти 4 года назад

Mozilla Firefox 2.0.0.14, and other versions before 2.0.0.17, allows remote attackers to bypass cross-site scripting (XSS) protection mechanisms and conduct XSS attacks via HTML-escaped low surrogate characters that are ignored by the HTML parser, as demonstrated by a "jav&#56325ascript" sequence, aka "HTML escaped low surrogates bug."

EPSS: Низкий
github логотип

GHSA-qpcp-783x-fcf2

больше 3 лет назад

A potentially exploitable use-after-free crash during actor destruction with service workers. This issue does not affect releases earlier than Firefox 49. This vulnerability affects Firefox < 49.0.2.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-qp6r-j328-v2w7

больше 3 лет назад

Mozilla developers Tyson Smith, Bob Clary, and Alexandru Michis reported memory safety bugs present in Firefox 74. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 75.

EPSS: Низкий
github логотип

GHSA-qp25-xm2x-r33g

больше 3 лет назад

Activity Stream can display content from sent from the Snippet Service website. This content is written to innerHTML on the Activity Stream page without sanitization, allowing for a potential access to other information available to the Activity Stream, such as browsing history, if the Snipper Service were compromised. This vulnerability affects Firefox < 68.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-qm6q-r7qr-vxjp

около 2 лет назад

Browser tab titles were being leaked by GNOME to system logs. This could potentially expose the browsing habits of users running in a private tab. This vulnerability affects Firefox < 121.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-qm5f-gm4h-wq94

около 3 лет назад

Mozilla developers and community members Randell Jesup, Sebastian Hengst, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 98. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 99.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-qjxq-j34f-3jf2

4 месяца назад

This vulnerability affects Firefox < 143.0.3.

CVSS3: 8.6
EPSS: Низкий
github логотип

GHSA-qj63-c77f-88gh

больше 3 лет назад

When the Windows DLL "webauthn.dll" was missing from the Operating System, and a malicious one was placed in a folder in the user's %PATH%, Firefox may have loaded the DLL, leading to arbitrary code execution. *Note: This issue only affects the Windows operating system; other operating systems are unaffected.* This vulnerability affects Firefox < 78.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-qj3f-v6p7-vxvm

больше 2 лет назад

Search queries in the default search engine could appear to have been the currently navigated URL if the search query itself was a well formed URL. This could have led to a site spoofing another if it had been maliciously set as the default search engine. This vulnerability affects Firefox < 117.

CVSS3: 3.1
EPSS: Низкий
github логотип

GHSA-qhr9-wjgv-2r72

около 3 лет назад

By confusing the browser, the fullscreen notification could have been delayed or suppressed, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox < 108.

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-qgjc-6844-xqv9

почти 4 года назад

** DISPUTED ** Mozilla Firefox 1.5.0.1, and possibly other versions, preserves some records of user activity even after uninstalling, which allows local users who share a Windows profile to view the records after a new installation of Firefox, as reported for the list of Passwords Never Saved web sites. NOTE: The vendor has disputed this issue, stating that "The uninstaller is primarily there to uninstall the application. It is not there to uninstall user data. For the moment I will stick by my module-owner decision."

EPSS: Низкий
github логотип

GHSA-qg25-r8rj-7fhp

около 3 лет назад

If the user added a security exception for an invalid TLS certificate, opened an ongoing TLS connection with a server that used that certificate, and then deleted the exception, Firefox would have kept the connection alive, making it seem like the certificate was still trusted. This vulnerability affects Firefox < 107.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-qfpv-wrwf-3vwj

почти 4 года назад

Mozilla Firefox 3.x before 3.0.6 does not properly implement the (1) no-store and (2) no-cache Cache-Control directives, which allows local users to obtain sensitive information by using the (a) back button or (b) history list of the victim's browser, as demonstrated by reading the response page of an https POST request.

EPSS: Низкий
github логотип

GHSA-qffr-cvph-655f

около 3 лет назад

In unusual circumstances, selecting text could cause text selection caching to behave incorrectly, leading to a crash. This vulnerability affects Firefox < 99.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-qcwg-qcmw-7525

почти 4 года назад

** DISPUTED ** Cross-domain vulnerability in Mozilla Firefox allows remote attackers to access restricted information from other domains via an object tag with a data parameter that references a link on the attacker's originating site that specifies a Location HTTP header that references the target site, which then makes that content available through the outerHTML attribute of the object. NOTE: this description was based on a report that has since been retracted by the original authors. The authors misinterpreted their test results. Other third parties also disputed the original report. Therefore, this is not a vulnerability. It is being assigned a candidate number to provide a clear indication of its status.

EPSS: Низкий
github логотип

GHSA-qcqq-5qh9-xq8v

больше 3 лет назад

Use-after-free vulnerability in the mozilla::nsTextNodeDirectionalityMap::RemoveElementFromMap function in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird < 45.4 allows remote attackers to execute arbitrary code via bidirectional text.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-qcqg-65g5-53c7

больше 3 лет назад

If websocket data is sent with mixed text and binary in a single message, the binary data can be corrupted. This can result in an out-of-bounds read with the read memory sent to the originating server in response. This vulnerability affects Firefox < 60.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-qcgx-hf6g-j7qv

почти 4 года назад

The Plugin Finder Service (PFS) in Firefox before 1.0.3 allows remote attackers to execute arbitrary code via a javascript: URL in the PLUGINSPAGE attribute of an EMBED tag.

EPSS: Низкий
github логотип

GHSA-qcgw-w6wr-h99m

больше 3 лет назад

gfx/2d/DataSurfaceHelpers.cpp in Mozilla Firefox before 41.0 on Linux improperly attempts to use the Cairo library with 32-bit color-depth surface creation followed by 16-bit color-depth surface display, which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) by using a CANVAS element to trigger 2D rendering.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-qqvm-q62q-qw92

Content Security Policy (CSP) is not applied correctly to all parts of multipart content sent with the "multipart/x-mixed-replace" MIME type. This could allow for script to run where CSP should block it, allowing for cross-site scripting (XSS) and other attacks. This vulnerability affects Firefox < 60.

CVSS3: 6.1
1%
Низкий
больше 3 лет назад
github логотип
GHSA-qqhw-rv6h-rvpx

Mozilla Firefox 2.0.0.14, and other versions before 2.0.0.17, allows remote attackers to bypass cross-site scripting (XSS) protection mechanisms and conduct XSS attacks via HTML-escaped low surrogate characters that are ignored by the HTML parser, as demonstrated by a "jav&#56325ascript" sequence, aka "HTML escaped low surrogates bug."

1%
Низкий
почти 4 года назад
github логотип
GHSA-qpcp-783x-fcf2

A potentially exploitable use-after-free crash during actor destruction with service workers. This issue does not affect releases earlier than Firefox 49. This vulnerability affects Firefox < 49.0.2.

CVSS3: 9.8
2%
Низкий
больше 3 лет назад
github логотип
GHSA-qp6r-j328-v2w7

Mozilla developers Tyson Smith, Bob Clary, and Alexandru Michis reported memory safety bugs present in Firefox 74. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 75.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-qp25-xm2x-r33g

Activity Stream can display content from sent from the Snippet Service website. This content is written to innerHTML on the Activity Stream page without sanitization, allowing for a potential access to other information available to the Activity Stream, such as browsing history, if the Snipper Service were compromised. This vulnerability affects Firefox < 68.

CVSS3: 5.3
1%
Низкий
больше 3 лет назад
github логотип
GHSA-qm6q-r7qr-vxjp

Browser tab titles were being leaked by GNOME to system logs. This could potentially expose the browsing habits of users running in a private tab. This vulnerability affects Firefox < 121.

CVSS3: 6.5
0%
Низкий
около 2 лет назад
github логотип
GHSA-qm5f-gm4h-wq94

Mozilla developers and community members Randell Jesup, Sebastian Hengst, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 98. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 99.

CVSS3: 8.8
0%
Низкий
около 3 лет назад
github логотип
GHSA-qjxq-j34f-3jf2

This vulnerability affects Firefox < 143.0.3.

CVSS3: 8.6
0%
Низкий
4 месяца назад
github логотип
GHSA-qj63-c77f-88gh

When the Windows DLL "webauthn.dll" was missing from the Operating System, and a malicious one was placed in a folder in the user's %PATH%, Firefox may have loaded the DLL, leading to arbitrary code execution. *Note: This issue only affects the Windows operating system; other operating systems are unaffected.* This vulnerability affects Firefox < 78.

CVSS3: 7.8
0%
Низкий
больше 3 лет назад
github логотип
GHSA-qj3f-v6p7-vxvm

Search queries in the default search engine could appear to have been the currently navigated URL if the search query itself was a well formed URL. This could have led to a site spoofing another if it had been maliciously set as the default search engine. This vulnerability affects Firefox < 117.

CVSS3: 3.1
0%
Низкий
больше 2 лет назад
github логотип
GHSA-qhr9-wjgv-2r72

By confusing the browser, the fullscreen notification could have been delayed or suppressed, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox < 108.

CVSS3: 4.3
0%
Низкий
около 3 лет назад
github логотип
GHSA-qgjc-6844-xqv9

** DISPUTED ** Mozilla Firefox 1.5.0.1, and possibly other versions, preserves some records of user activity even after uninstalling, which allows local users who share a Windows profile to view the records after a new installation of Firefox, as reported for the list of Passwords Never Saved web sites. NOTE: The vendor has disputed this issue, stating that "The uninstaller is primarily there to uninstall the application. It is not there to uninstall user data. For the moment I will stick by my module-owner decision."

0%
Низкий
почти 4 года назад
github логотип
GHSA-qg25-r8rj-7fhp

If the user added a security exception for an invalid TLS certificate, opened an ongoing TLS connection with a server that used that certificate, and then deleted the exception, Firefox would have kept the connection alive, making it seem like the certificate was still trusted. This vulnerability affects Firefox < 107.

CVSS3: 6.5
0%
Низкий
около 3 лет назад
github логотип
GHSA-qfpv-wrwf-3vwj

Mozilla Firefox 3.x before 3.0.6 does not properly implement the (1) no-store and (2) no-cache Cache-Control directives, which allows local users to obtain sensitive information by using the (a) back button or (b) history list of the victim's browser, as demonstrated by reading the response page of an https POST request.

0%
Низкий
почти 4 года назад
github логотип
GHSA-qffr-cvph-655f

In unusual circumstances, selecting text could cause text selection caching to behave incorrectly, leading to a crash. This vulnerability affects Firefox < 99.

CVSS3: 6.5
0%
Низкий
около 3 лет назад
github логотип
GHSA-qcwg-qcmw-7525

** DISPUTED ** Cross-domain vulnerability in Mozilla Firefox allows remote attackers to access restricted information from other domains via an object tag with a data parameter that references a link on the attacker's originating site that specifies a Location HTTP header that references the target site, which then makes that content available through the outerHTML attribute of the object. NOTE: this description was based on a report that has since been retracted by the original authors. The authors misinterpreted their test results. Other third parties also disputed the original report. Therefore, this is not a vulnerability. It is being assigned a candidate number to provide a clear indication of its status.

1%
Низкий
почти 4 года назад
github логотип
GHSA-qcqq-5qh9-xq8v

Use-after-free vulnerability in the mozilla::nsTextNodeDirectionalityMap::RemoveElementFromMap function in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird < 45.4 allows remote attackers to execute arbitrary code via bidirectional text.

CVSS3: 9.8
2%
Низкий
больше 3 лет назад
github логотип
GHSA-qcqg-65g5-53c7

If websocket data is sent with mixed text and binary in a single message, the binary data can be corrupted. This can result in an out-of-bounds read with the read memory sent to the originating server in response. This vulnerability affects Firefox < 60.

CVSS3: 7.5
1%
Низкий
больше 3 лет назад
github логотип
GHSA-qcgx-hf6g-j7qv

The Plugin Finder Service (PFS) in Firefox before 1.0.3 allows remote attackers to execute arbitrary code via a javascript: URL in the PLUGINSPAGE attribute of an EMBED tag.

4%
Низкий
почти 4 года назад
github логотип
GHSA-qcgw-w6wr-h99m

gfx/2d/DataSurfaceHelpers.cpp in Mozilla Firefox before 41.0 on Linux improperly attempts to use the Cairo library with 32-bit color-depth surface creation followed by 16-bit color-depth surface display, which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) by using a CANVAS element to trigger 2D rendering.

2%
Низкий
больше 3 лет назад

Уязвимостей на страницу