Логотип exploitDog
product: "firefox"
Консоль
Логотип exploitDog

exploitDog

product: "firefox"

Количество 14 782

Количество 14 782

github логотип

GHSA-x73f-6qwm-hh3x

больше 1 года назад

A compromised content process could have updated the document URI. This could have allowed an attacker to set an arbitrary URI in the address bar or history. This vulnerability affects Firefox < 122.

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-x63v-c8hj-q3pw

около 3 лет назад

The importScripts function in the Web Workers API implementation in Mozilla Firefox before 43.0 allows remote attackers to bypass the Same Origin Policy by triggering use of the no-cors mode in the fetch API to attempt resource access that throws an exception, leading to information disclosure after a rethrow.

EPSS: Низкий
github логотип

GHSA-x5xq-hf4g-4cgq

больше 3 лет назад

The 'Copy Image Link' context menu action would copy the final image URL after redirects. By embedding an image that triggered authentication flows - in conjunction with a Content Security Policy that stopped a redirection chain in the middle - the final image URL could be one that contained an authentication token used to takeover a user account. If a website tricked a user into copy and pasting the image link back to the page, the page would be able to steal the authentication tokens. This was fixed by making the action return the original URL, before any redirects. This vulnerability affects Firefox < 94.

EPSS: Низкий
github логотип

GHSA-x5ph-343m-g2xh

больше 3 лет назад

CRLF injection vulnerability in Mozilla Firefox before 2.0.0.12 allows remote user-assisted web sites to corrupt the user's password store via newlines that are not properly handled when the user saves a password.

EPSS: Низкий
github логотип

GHSA-x5jm-2j58-gxgp

больше 3 лет назад

Mozilla Firefox 3.0.7 on Windows 7 allows remote attackers to execute arbitrary code via unknown vectors related to the _moveToEdgeShift XUL tree method, which triggers garbage collection on objects that are still in use, as demonstrated by Nils during a PWN2OWN competition at CanSecWest 2009.

EPSS: Низкий
github логотип

GHSA-x4vx-jp8h-mrcx

около 1 года назад

Different techniques existed to obscure the fullscreen notification in Firefox for Android. These could have lead to potential user confusion and spoofing attacks. *This bug only affects Firefox for Android. Other versions of Firefox are unaffected.* This vulnerability affects Firefox < 126.

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-x4p9-6wvp-vc8f

около 3 лет назад

Mixed-content checks were unable to analyze opaque origins which led to some mixed content being loaded. This vulnerability affects Firefox < 92.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-x4p5-q86p-74vp

около 3 лет назад

The JSON Viewer displays clickable hyperlinks for strings that are parseable as URLs, including "javascript:" links. If a JSON file contains malicious JavaScript script embedded as "javascript:" links, users may be tricked into clicking and running this code in the context of the JSON Viewer. This can allow for the theft of cookies and authorization tokens which are accessible to that context. This vulnerability affects Firefox < 60.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-x4mq-76g8-78f6

около 3 лет назад

Mozilla Firefox before 46.0 on Android does not properly restrict JavaScript access to orientation and motion data, which allows remote attackers to obtain sensitive information about a device's physical environment, and possibly discover PIN values, via a crafted web site, a similar issue to CVE-2016-1780.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-x428-6vv2-wx8p

около 2 лет назад

A compromised child process could have injected XBL Bindings into privileged CSS rules, resulting in arbitrary code execution and a sandbox escape. This vulnerability affects Firefox < 70.

CVSS3: 10
EPSS: Низкий
github логотип

GHSA-x3xw-gpqw-j8j2

больше 3 лет назад

Firefox before 1.0.1 allows remote attackers to spoof the (1) security and (2) download modal dialog boxes, which could be used to trick users into executing script or downloading and executing a file, aka "Firespoofing."

EPSS: Низкий
github логотип

GHSA-x2x8-qmfc-8j2r

больше 3 лет назад

The install function in Firefox 1.0.3 allows remote web sites on the browser's whitelist, such as update.mozilla.org or addon.mozilla.org, to execute arbitrary Javascript with chrome privileges, leading to arbitrary code execution on the system when combined with vulnerabilities such as CVE-2005-1476, as demonstrated using a javascript: URL as the package icon and a cross-site scripting (XSS) attack on a vulnerable whitelist site.

EPSS: Средний
github логотип

GHSA-x2m9-q3vv-hr85

около 3 лет назад

By navigating a tab using the history API, an attacker could cause the address bar to display the incorrect domain (with the https:// scheme, a blocked port number such as '1', and without a lock icon) while controlling the page contents. This vulnerability affects Firefox < 70.

EPSS: Низкий
github логотип

GHSA-x2jf-fqm5-8f5p

около 3 лет назад

Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 44.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to uninitialized memory encountered during brotli data compression, and other vectors.

CVSS3: 10
EPSS: Низкий
github логотип

GHSA-wxv2-7x8x-wpcq

около 3 лет назад

The TCP Socket API implementation in Mozilla Firefox before 41.0 mishandles array boundaries that were established with a navigator.mozTCPSocket.open method call and send method calls, which allows remote TCP servers to obtain sensitive information from process memory by reading packet data, as demonstrated by availability of this API in a Firefox OS application.

EPSS: Низкий
github логотип

GHSA-wxmw-mw39-8fw9

около 3 лет назад

In private browsing mode on Firefox for Android, favicons are cached in the cache/icons folder as they are in non-private mode. This allows information leakage of sites visited during private browsing sessions. *Note: this issue only affects Firefox for Android. Desktop versions of Firefox are unaffected.*. This vulnerability affects Firefox < 63.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-wx2c-j97m-grcg

около 2 лет назад

A website could prevent a user from exiting full-screen mode via alert and prompt calls. This could lead to user confusion and possible spoofing attacks. This vulnerability affects Firefox < 115.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-wwpm-rgch-9v66

около 3 лет назад

Mozilla Firefox before 27.0 does not properly restrict access to about:home buttons by script on other pages, which allows user-assisted remote attackers to cause a denial of service (session restore) via a crafted web site.

EPSS: Низкий
github логотип

GHSA-ww69-c6p5-r54m

больше 1 года назад

Passing invalid data could have led to invalid wasm values being created, such as arbitrary integers turning into pointer values. This vulnerability affects Firefox < 124.

CVSS3: 3.7
EPSS: Низкий
github логотип

GHSA-ww29-fh6f-953x

около 2 лет назад

When opening appref-ms files, Firefox did not warn the user that these files may contain malicious code. *This bug only affects Firefox on Windows. Other operating systems are unaffected.* This vulnerability affects Firefox < 116, Firefox ESR < 102.14, and Firefox ESR < 115.1.

CVSS3: 5.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-x73f-6qwm-hh3x

A compromised content process could have updated the document URI. This could have allowed an attacker to set an arbitrary URI in the address bar or history. This vulnerability affects Firefox < 122.

CVSS3: 4.3
0%
Низкий
больше 1 года назад
github логотип
GHSA-x63v-c8hj-q3pw

The importScripts function in the Web Workers API implementation in Mozilla Firefox before 43.0 allows remote attackers to bypass the Same Origin Policy by triggering use of the no-cors mode in the fetch API to attempt resource access that throws an exception, leading to information disclosure after a rethrow.

0%
Низкий
около 3 лет назад
github логотип
GHSA-x5xq-hf4g-4cgq

The 'Copy Image Link' context menu action would copy the final image URL after redirects. By embedding an image that triggered authentication flows - in conjunction with a Content Security Policy that stopped a redirection chain in the middle - the final image URL could be one that contained an authentication token used to takeover a user account. If a website tricked a user into copy and pasting the image link back to the page, the page would be able to steal the authentication tokens. This was fixed by making the action return the original URL, before any redirects. This vulnerability affects Firefox < 94.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-x5ph-343m-g2xh

CRLF injection vulnerability in Mozilla Firefox before 2.0.0.12 allows remote user-assisted web sites to corrupt the user's password store via newlines that are not properly handled when the user saves a password.

2%
Низкий
больше 3 лет назад
github логотип
GHSA-x5jm-2j58-gxgp

Mozilla Firefox 3.0.7 on Windows 7 allows remote attackers to execute arbitrary code via unknown vectors related to the _moveToEdgeShift XUL tree method, which triggers garbage collection on objects that are still in use, as demonstrated by Nils during a PWN2OWN competition at CanSecWest 2009.

9%
Низкий
больше 3 лет назад
github логотип
GHSA-x4vx-jp8h-mrcx

Different techniques existed to obscure the fullscreen notification in Firefox for Android. These could have lead to potential user confusion and spoofing attacks. *This bug only affects Firefox for Android. Other versions of Firefox are unaffected.* This vulnerability affects Firefox < 126.

CVSS3: 4.3
0%
Низкий
около 1 года назад
github логотип
GHSA-x4p9-6wvp-vc8f

Mixed-content checks were unable to analyze opaque origins which led to some mixed content being loaded. This vulnerability affects Firefox < 92.

CVSS3: 6.5
0%
Низкий
около 3 лет назад
github логотип
GHSA-x4p5-q86p-74vp

The JSON Viewer displays clickable hyperlinks for strings that are parseable as URLs, including "javascript:" links. If a JSON file contains malicious JavaScript script embedded as "javascript:" links, users may be tricked into clicking and running this code in the context of the JSON Viewer. This can allow for the theft of cookies and authorization tokens which are accessible to that context. This vulnerability affects Firefox < 60.

CVSS3: 6.1
0%
Низкий
около 3 лет назад
github логотип
GHSA-x4mq-76g8-78f6

Mozilla Firefox before 46.0 on Android does not properly restrict JavaScript access to orientation and motion data, which allows remote attackers to obtain sensitive information about a device's physical environment, and possibly discover PIN values, via a crafted web site, a similar issue to CVE-2016-1780.

CVSS3: 6.5
0%
Низкий
около 3 лет назад
github логотип
GHSA-x428-6vv2-wx8p

A compromised child process could have injected XBL Bindings into privileged CSS rules, resulting in arbitrary code execution and a sandbox escape. This vulnerability affects Firefox < 70.

CVSS3: 10
0%
Низкий
около 2 лет назад
github логотип
GHSA-x3xw-gpqw-j8j2

Firefox before 1.0.1 allows remote attackers to spoof the (1) security and (2) download modal dialog boxes, which could be used to trick users into executing script or downloading and executing a file, aka "Firespoofing."

2%
Низкий
больше 3 лет назад
github логотип
GHSA-x2x8-qmfc-8j2r

The install function in Firefox 1.0.3 allows remote web sites on the browser's whitelist, such as update.mozilla.org or addon.mozilla.org, to execute arbitrary Javascript with chrome privileges, leading to arbitrary code execution on the system when combined with vulnerabilities such as CVE-2005-1476, as demonstrated using a javascript: URL as the package icon and a cross-site scripting (XSS) attack on a vulnerable whitelist site.

32%
Средний
больше 3 лет назад
github логотип
GHSA-x2m9-q3vv-hr85

By navigating a tab using the history API, an attacker could cause the address bar to display the incorrect domain (with the https:// scheme, a blocked port number such as '1', and without a lock icon) while controlling the page contents. This vulnerability affects Firefox < 70.

0%
Низкий
около 3 лет назад
github логотип
GHSA-x2jf-fqm5-8f5p

Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 44.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to uninitialized memory encountered during brotli data compression, and other vectors.

CVSS3: 10
2%
Низкий
около 3 лет назад
github логотип
GHSA-wxv2-7x8x-wpcq

The TCP Socket API implementation in Mozilla Firefox before 41.0 mishandles array boundaries that were established with a navigator.mozTCPSocket.open method call and send method calls, which allows remote TCP servers to obtain sensitive information from process memory by reading packet data, as demonstrated by availability of this API in a Firefox OS application.

1%
Низкий
около 3 лет назад
github логотип
GHSA-wxmw-mw39-8fw9

In private browsing mode on Firefox for Android, favicons are cached in the cache/icons folder as they are in non-private mode. This allows information leakage of sites visited during private browsing sessions. *Note: this issue only affects Firefox for Android. Desktop versions of Firefox are unaffected.*. This vulnerability affects Firefox < 63.

CVSS3: 5.3
0%
Низкий
около 3 лет назад
github логотип
GHSA-wx2c-j97m-grcg

A website could prevent a user from exiting full-screen mode via alert and prompt calls. This could lead to user confusion and possible spoofing attacks. This vulnerability affects Firefox < 115.

CVSS3: 6.5
0%
Низкий
около 2 лет назад
github логотип
GHSA-wwpm-rgch-9v66

Mozilla Firefox before 27.0 does not properly restrict access to about:home buttons by script on other pages, which allows user-assisted remote attackers to cause a denial of service (session restore) via a crafted web site.

1%
Низкий
около 3 лет назад
github логотип
GHSA-ww69-c6p5-r54m

Passing invalid data could have led to invalid wasm values being created, such as arbitrary integers turning into pointer values. This vulnerability affects Firefox < 124.

CVSS3: 3.7
0%
Низкий
больше 1 года назад
github логотип
GHSA-ww29-fh6f-953x

When opening appref-ms files, Firefox did not warn the user that these files may contain malicious code. *This bug only affects Firefox on Windows. Other operating systems are unaffected.* This vulnerability affects Firefox < 116, Firefox ESR < 102.14, and Firefox ESR < 115.1.

CVSS3: 5.5
0%
Низкий
около 2 лет назад

Уязвимостей на страницу