Логотип exploitDog
product: "firefox"
Консоль
Логотип exploitDog

exploitDog

product: "firefox"

Количество 15 501

Количество 15 501

github логотип

GHSA-mxf2-hfjf-3p4q

больше 3 лет назад

The Mozilla Maintenance Service can be invoked by an unprivileged user to read 32 bytes of any arbitrary file on the local system by convincing the service that it is reading a status file provided by the Mozilla Windows Updater. The Mozilla Maintenance Service executes with privileged access, bypassing system protections against unprivileged users. Note: This attack requires local system access and only affects Windows. Other operating systems are not affected. This vulnerability affects Firefox ESR < 52.2 and Firefox < 54.

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-mx4x-6484-3f7v

почти 4 года назад

Mozilla Firefox 3 before 3.0.11 associates an incorrect principal with a file: URL loaded through the location bar, which allows user-assisted remote attackers to bypass intended access restrictions and read files via a crafted HTML document, aka a "file-URL-to-file-URL scripting" attack.

EPSS: Средний
github логотип

GHSA-mwj6-29r9-vgq2

больше 3 лет назад

An issue with incorrect ownership model of "privateBrowsing" information exposed through developer tools. This can result in a non-exploitable crash when manually triggered during debugging. This vulnerability affects Firefox < 53.

CVSS3: 9.1
EPSS: Низкий
github логотип

GHSA-mv6j-qcrj-q856

около 2 лет назад

If an attacker needed a user to load an insecure http: page and knew that user had enabled HTTPS-only mode, the attacker could have tricked the user into clicking to grant an HTTPS-only exception if they could get the user to participate in a clicking game. This vulnerability affects Firefox < 120.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-mv5g-cf64-38cv

3 месяца назад

Same-origin policy bypass in the DOM: Workers component. This vulnerability affects Firefox < 145 and Firefox ESR < 140.5.

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-mrq8-v5mr-5qwj

больше 3 лет назад

The PRNG implementation in the DNS resolver in Mozilla Firefox (aka Fennec) before 37.0 on Android does not properly generate random numbers for query ID values and UDP source ports, which makes it easier for remote attackers to spoof DNS responses by guessing these numbers, a related issue to CVE-2012-2808.

EPSS: Низкий
github логотип

GHSA-mqxv-fv77-3585

3 месяца назад

JIT miscompilation in the JavaScript Engine: JIT component. This vulnerability affects Firefox < 145.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-mqrf-j5vq-j64f

больше 3 лет назад

Mozilla Firefox 3.6.3 on Windows XP SP3 allows remote attackers to cause a denial of service (memory consumption and application crash) via JavaScript code that creates multiple arrays containing elements with long string values, and then appends long strings to the content of a P element, related to the gfxWindowsFontGroup::MakeTextRun function in xul.dll, a different vulnerability than CVE-2009-1571.

EPSS: Низкий
github логотип

GHSA-mq84-3c8v-r75g

почти 4 года назад

Mozilla Firefox 1.5.0.6 allows remote attackers to execute arbitrary JavaScript in the context of the browser's session with an arbitrary intranet web server, by hosting script on an Internet web server that can be made inaccessible by the attacker and that has a domain name under the attacker's control, which can force the browser to drop DNS pinning and perform a new DNS query for the domain name after the script is already running.

EPSS: Низкий
github логотип

GHSA-mpq5-qrjq-v2rf

больше 3 лет назад

Mozilla developers and community members reported memory safety bugs present in Firefox 90. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 91.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-mpq2-pcrq-r69f

почти 4 года назад

Mozilla Firefox 3.0.13 and earlier, 3.5, 3.6 a1 pre, and 3.7 a1 pre does not properly block data: URIs in Location headers in HTTP responses, which allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to (1) injecting a Location header that contains JavaScript sequences in a data:text/html URI or (2) entering a data:text/html URI with JavaScript sequences when specifying the content of a Location header. NOTE: the JavaScript executes outside of the context of the HTTP site.

EPSS: Низкий
github логотип

GHSA-mp2h-wg49-xrpx

больше 3 лет назад

Mozilla Firefox 8.0.1 and earlier does not prevent capture of data about the times of Same Origin Policy violations during IFRAME loading attempts, which makes it easier for remote attackers to determine whether a document exists in the browser cache via crafted JavaScript code.

EPSS: Низкий
github логотип

GHSA-mmrj-hw4g-j8hv

больше 3 лет назад

By using the reflected URL in some special resource URIs, such as chrome:, it is possible to inject stylesheets and bypass Content Security Policy (CSP). This vulnerability affects Firefox < 63.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-mmqm-9qw8-9hc9

больше 3 лет назад

The update implementation in Mozilla Firefox before 38.0 on Windows does not ensure that the pathname for updater.exe corresponds to the application directory, which might allow local users to gain privileges via a Trojan horse file.

EPSS: Низкий
github логотип

GHSA-mmmm-6m78-44q2

3 месяца назад

Starting with Firefox 142, it was possible for a compromised child process to trigger a use-after-free in the GPU or browser process using WebGPU-related IPC calls. This may have been usable to escape the child process sandbox. This vulnerability affects Firefox < 144.0.2.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-mjv5-g7c5-w9hq

больше 3 лет назад

WebExtension scripts can use the "data:" protocol to affect pages loaded by other web extensions using this protocol, leading to potential data disclosure or privilege escalation in affected extensions. This vulnerability affects Firefox ESR < 45.7 and Firefox < 51.

CVSS3: 7.3
EPSS: Низкий
github логотип

GHSA-mjjx-mm3w-x2f2

больше 3 лет назад

The WebGL implementation in Mozilla Firefox before 36.0 does not properly allocate memory for copying an unspecified string to a shader's compilation log, which allows remote attackers to cause a denial of service (application crash) via crafted WebGL content.

EPSS: Низкий
github логотип

GHSA-mj4m-r6rh-5xrx

больше 3 лет назад

Multiple heap-based buffer overflows in the navigator.getGamepads function in the Gamepad API in Mozilla Firefox before 30.0 allow remote attackers to execute arbitrary code by using non-contiguous axes with a (1) physical or (2) virtual Gamepad device.

EPSS: Низкий
github логотип

GHSA-mhrf-5mvv-xxp7

больше 3 лет назад

Heap-based buffer overflow in the nestegg_track_codec_data function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allows remote attackers to execute arbitrary code via a crafted header in a WebM video.

EPSS: Низкий
github логотип

GHSA-mhpj-9q2x-79mx

больше 3 лет назад

If the source for resources on a page is through an FTP connection, it is possible to trigger a series of modal alert messages for these resources through invalid credentials or locations. These messages cannot be immediately dismissed, allowing for a denial of service (DOS) attack. This vulnerability affects Firefox < 66.

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-mxf2-hfjf-3p4q

The Mozilla Maintenance Service can be invoked by an unprivileged user to read 32 bytes of any arbitrary file on the local system by convincing the service that it is reading a status file provided by the Mozilla Windows Updater. The Mozilla Maintenance Service executes with privileged access, bypassing system protections against unprivileged users. Note: This attack requires local system access and only affects Windows. Other operating systems are not affected. This vulnerability affects Firefox ESR < 52.2 and Firefox < 54.

CVSS3: 5.5
0%
Низкий
больше 3 лет назад
github логотип
GHSA-mx4x-6484-3f7v

Mozilla Firefox 3 before 3.0.11 associates an incorrect principal with a file: URL loaded through the location bar, which allows user-assisted remote attackers to bypass intended access restrictions and read files via a crafted HTML document, aka a "file-URL-to-file-URL scripting" attack.

15%
Средний
почти 4 года назад
github логотип
GHSA-mwj6-29r9-vgq2

An issue with incorrect ownership model of "privateBrowsing" information exposed through developer tools. This can result in a non-exploitable crash when manually triggered during debugging. This vulnerability affects Firefox < 53.

CVSS3: 9.1
2%
Низкий
больше 3 лет назад
github логотип
GHSA-mv6j-qcrj-q856

If an attacker needed a user to load an insecure http: page and knew that user had enabled HTTPS-only mode, the attacker could have tricked the user into clicking to grant an HTTPS-only exception if they could get the user to participate in a clicking game. This vulnerability affects Firefox < 120.

CVSS3: 6.5
0%
Низкий
около 2 лет назад
github логотип
GHSA-mv5g-cf64-38cv

Same-origin policy bypass in the DOM: Workers component. This vulnerability affects Firefox < 145 and Firefox ESR < 140.5.

CVSS3: 8.1
0%
Низкий
3 месяца назад
github логотип
GHSA-mrq8-v5mr-5qwj

The PRNG implementation in the DNS resolver in Mozilla Firefox (aka Fennec) before 37.0 on Android does not properly generate random numbers for query ID values and UDP source ports, which makes it easier for remote attackers to spoof DNS responses by guessing these numbers, a related issue to CVE-2012-2808.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-mqxv-fv77-3585

JIT miscompilation in the JavaScript Engine: JIT component. This vulnerability affects Firefox < 145.

CVSS3: 9.8
0%
Низкий
3 месяца назад
github логотип
GHSA-mqrf-j5vq-j64f

Mozilla Firefox 3.6.3 on Windows XP SP3 allows remote attackers to cause a denial of service (memory consumption and application crash) via JavaScript code that creates multiple arrays containing elements with long string values, and then appends long strings to the content of a P element, related to the gfxWindowsFontGroup::MakeTextRun function in xul.dll, a different vulnerability than CVE-2009-1571.

1%
Низкий
больше 3 лет назад
github логотип
GHSA-mq84-3c8v-r75g

Mozilla Firefox 1.5.0.6 allows remote attackers to execute arbitrary JavaScript in the context of the browser's session with an arbitrary intranet web server, by hosting script on an Internet web server that can be made inaccessible by the attacker and that has a domain name under the attacker's control, which can force the browser to drop DNS pinning and perform a new DNS query for the domain name after the script is already running.

1%
Низкий
почти 4 года назад
github логотип
GHSA-mpq5-qrjq-v2rf

Mozilla developers and community members reported memory safety bugs present in Firefox 90. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 91.

CVSS3: 8.8
0%
Низкий
больше 3 лет назад
github логотип
GHSA-mpq2-pcrq-r69f

Mozilla Firefox 3.0.13 and earlier, 3.5, 3.6 a1 pre, and 3.7 a1 pre does not properly block data: URIs in Location headers in HTTP responses, which allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to (1) injecting a Location header that contains JavaScript sequences in a data:text/html URI or (2) entering a data:text/html URI with JavaScript sequences when specifying the content of a Location header. NOTE: the JavaScript executes outside of the context of the HTTP site.

0%
Низкий
почти 4 года назад
github логотип
GHSA-mp2h-wg49-xrpx

Mozilla Firefox 8.0.1 and earlier does not prevent capture of data about the times of Same Origin Policy violations during IFRAME loading attempts, which makes it easier for remote attackers to determine whether a document exists in the browser cache via crafted JavaScript code.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-mmrj-hw4g-j8hv

By using the reflected URL in some special resource URIs, such as chrome:, it is possible to inject stylesheets and bypass Content Security Policy (CSP). This vulnerability affects Firefox < 63.

CVSS3: 6.5
0%
Низкий
больше 3 лет назад
github логотип
GHSA-mmqm-9qw8-9hc9

The update implementation in Mozilla Firefox before 38.0 on Windows does not ensure that the pathname for updater.exe corresponds to the application directory, which might allow local users to gain privileges via a Trojan horse file.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-mmmm-6m78-44q2

Starting with Firefox 142, it was possible for a compromised child process to trigger a use-after-free in the GPU or browser process using WebGPU-related IPC calls. This may have been usable to escape the child process sandbox. This vulnerability affects Firefox < 144.0.2.

CVSS3: 9.8
0%
Низкий
3 месяца назад
github логотип
GHSA-mjv5-g7c5-w9hq

WebExtension scripts can use the "data:" protocol to affect pages loaded by other web extensions using this protocol, leading to potential data disclosure or privilege escalation in affected extensions. This vulnerability affects Firefox ESR < 45.7 and Firefox < 51.

CVSS3: 7.3
1%
Низкий
больше 3 лет назад
github логотип
GHSA-mjjx-mm3w-x2f2

The WebGL implementation in Mozilla Firefox before 36.0 does not properly allocate memory for copying an unspecified string to a shader's compilation log, which allows remote attackers to cause a denial of service (application crash) via crafted WebGL content.

1%
Низкий
больше 3 лет назад
github логотип
GHSA-mj4m-r6rh-5xrx

Multiple heap-based buffer overflows in the navigator.getGamepads function in the Gamepad API in Mozilla Firefox before 30.0 allow remote attackers to execute arbitrary code by using non-contiguous axes with a (1) physical or (2) virtual Gamepad device.

3%
Низкий
больше 3 лет назад
github логотип
GHSA-mhrf-5mvv-xxp7

Heap-based buffer overflow in the nestegg_track_codec_data function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allows remote attackers to execute arbitrary code via a crafted header in a WebM video.

4%
Низкий
больше 3 лет назад
github логотип
GHSA-mhpj-9q2x-79mx

If the source for resources on a page is through an FTP connection, it is possible to trigger a series of modal alert messages for these resources through invalid credentials or locations. These messages cannot be immediately dismissed, allowing for a denial of service (DOS) attack. This vulnerability affects Firefox < 66.

CVSS3: 7.5
1%
Низкий
больше 3 лет назад

Уязвимостей на страницу