Логотип exploitDog
product: "firefox"
Консоль
Логотип exploitDog

exploitDog

product: "firefox"

Количество 15 501

Количество 15 501

github логотип

GHSA-hmj5-pvfm-pffx

больше 3 лет назад

The js_InitRandom function in the JavaScript implementation in Mozilla Firefox 3.5.10 through 3.5.11, 3.6.4 through 3.6.8, and 4.0 Beta1 uses a context pointer in conjunction with its successor pointer for seeding of a random number generator, which makes it easier for remote attackers to guess the seed value via a brute-force attack, a different vulnerability than CVE-2010-3171.

EPSS: Низкий
github логотип

GHSA-hmhq-whfw-x78q

больше 3 лет назад

If a user had granted a permission to a webpage and saved that grant, any webpage running on the same host - irrespective of scheme or port - would be granted that permission. *This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 90.

EPSS: Низкий
github логотип

GHSA-hjxq-w2ww-jfj3

почти 2 года назад

A use-after-free could occur during WASM execution if garbage collection ran during the creation of an array. This vulnerability affects Firefox < 125.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-hjv3-x37x-j8jm

3 месяца назад

Incorrect boundary conditions in the Graphics: WebGPU component. This vulnerability affects Firefox < 145.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-hj6m-j4xw-c8m8

около 3 лет назад

When using the Performance API, an attacker was able to notice subtle differences between PerformanceEntries and thus learn whether the target URL had been subject to a redirect. This vulnerability affects Firefox < 103.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-hj65-9wfc-jmf4

больше 1 года назад

Under certain conditions, an attacker with the ability to redirect users to a malicious site via an open redirect on a trusted site, may be able to spoof the address bar contents. This can lead to a malicious site to appear to have the same URL as the trusted site. *This bug only affects Firefox for Android. Other versions of Firefox are unaffected.* This vulnerability affects Firefox for Android < 130.0.1.

CVSS3: 6.1
EPSS: Средний
github логотип

GHSA-hj55-p279-fxpp

больше 3 лет назад

The HTTP/2 implementation in Mozilla Firefox before 43.0 allows remote attackers to cause a denial of service (integer underflow, assertion failure, and application exit) via a malformed PushPromise frame that triggers decompressed-buffer length miscalculation and incorrect memory allocation.

EPSS: Низкий
github логотип

GHSA-hhwp-x6c3-m33w

почти 4 года назад

Firefox 1.0.3 and 1.0.4, and Netscape 8.0.2, allows remote attackers to execute arbitrary code by tricking the user into using the "Set As Wallpaper" (in Firefox) or "Set as Background" (in Netscape) context menu on an image URL that is really a javascript: URL with an eval statement, aka "Firewalling."

EPSS: Средний
github логотип

GHSA-hhpx-96r3-vcrp

больше 3 лет назад

When browsing a document hosted on an IP address, an attacker could insert certain characters to flip domain and path information in the address bar. This vulnerability affects Firefox < 77.

EPSS: Низкий
github логотип

GHSA-hh4w-c577-5gx4

почти 4 года назад

The PLUGINSPAGE functionality in Mozilla Firefox before 1.5.0.4 allows remote user-assisted attackers to execute privileged code by tricking a user into installing missing plugins and selecting the "Manual Install" button, then using nested javascript: URLs. NOTE: the manual install button is used for downloading software from a remote web site, so this issue would not cross privilege boundaries if the user progresses to the point of installing malicious software from the attacker-controlled site.

EPSS: Низкий
github логотип

GHSA-hgp6-pgqq-pp4q

больше 3 лет назад

The ReadbackResultWriterD3D11::Run function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 misinterprets the return value of a function call, which might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.

EPSS: Низкий
github логотип

GHSA-hgfv-gvcw-686v

больше 3 лет назад

A content security policy (CSP) "frame-ancestors" directive containing origins with paths allows for comparisons against those paths instead of the origin. This results in a cross-origin information leak of this path information. This vulnerability affects Firefox < 55.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-hg6x-mmgv-6qvx

больше 3 лет назад

The filename appearing in the "Downloads" panel improperly renders some Unicode characters, allowing for the file name to be spoofed. This can be used to obscure the file extension of potentially executable files from user view in the panel. Note: the dialog to open the file will show the full, correct filename and whether it is executable or not. This vulnerability affects Firefox < 60.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-hfq5-47x3-ghhc

почти 4 года назад

The user interface event dispatcher in Mozilla Firefox 3.0.3 on Windows XP SP2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a series of keypress, click, onkeydown, onkeyup, onmousedown, and onmouseup events. NOTE: it was later reported that Firefox 3.0.2 on Mac OS X 10.5 is also affected.

EPSS: Низкий
github логотип

GHSA-hf84-87fj-v8xv

больше 3 лет назад

Under certain circumstances the "fetch()" API can return transient local copies of resources that were sent with a "no-store" or "no-cache" cache header instead of downloading a copy from the network as it should. This can result in previously stored, locally cached data of a website being accessible to users if they share a common profile while browsing. This vulnerability affects Firefox ESR < 52.7 and Firefox < 59.

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-hf6r-227w-qwf9

8 месяцев назад

In certain cases, SNI could have been sent unencrypted even when encrypted DNS was enabled. This vulnerability affects Firefox < 139.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-hf5c-hjgx-rmrw

почти 2 года назад

It was possible to mutate a JavaScript object so that the JIT could crash while tracing it. This vulnerability affects Firefox < 125.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-hcmc-w4r8-h827

почти 4 года назад

Mozilla Firefox 3.0 beta 5 allows remote attackers to cause a denial of service (application crash) via JavaScript code that calls document.write in an infinite loop.

EPSS: Низкий
github логотип

GHSA-hcj3-374q-57xq

почти 4 года назад

The nsExternalAppHandler::SetUpTempFile function in Mozilla Firefox 1.5.0.9 creates temporary files with predictable filenames based on creation time, which allows remote attackers to execute arbitrary web script or HTML via a crafted XMLHttpRequest.

EPSS: Низкий
github логотип

GHSA-hc8c-44hv-5hc7

больше 3 лет назад

In 32-bit versions of Firefox, the Adobe Flash plugin setting for "Enable Adobe Flash protected mode" is unchecked by default even though the Adobe Flash sandbox is actually enabled. The displayed state is the reverse of the true setting, resulting in user confusion. This could cause users to select this setting intending to activate it and inadvertently turn protections off. This vulnerability affects Firefox < 60.

CVSS3: 5.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-hmj5-pvfm-pffx

The js_InitRandom function in the JavaScript implementation in Mozilla Firefox 3.5.10 through 3.5.11, 3.6.4 through 3.6.8, and 4.0 Beta1 uses a context pointer in conjunction with its successor pointer for seeding of a random number generator, which makes it easier for remote attackers to guess the seed value via a brute-force attack, a different vulnerability than CVE-2010-3171.

1%
Низкий
больше 3 лет назад
github логотип
GHSA-hmhq-whfw-x78q

If a user had granted a permission to a webpage and saved that grant, any webpage running on the same host - irrespective of scheme or port - would be granted that permission. *This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 90.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-hjxq-w2ww-jfj3

A use-after-free could occur during WASM execution if garbage collection ran during the creation of an array. This vulnerability affects Firefox < 125.

CVSS3: 8.8
1%
Низкий
почти 2 года назад
github логотип
GHSA-hjv3-x37x-j8jm

Incorrect boundary conditions in the Graphics: WebGPU component. This vulnerability affects Firefox < 145.

CVSS3: 7.5
0%
Низкий
3 месяца назад
github логотип
GHSA-hj6m-j4xw-c8m8

When using the Performance API, an attacker was able to notice subtle differences between PerformanceEntries and thus learn whether the target URL had been subject to a redirect. This vulnerability affects Firefox < 103.

CVSS3: 6.1
0%
Низкий
около 3 лет назад
github логотип
GHSA-hj65-9wfc-jmf4

Under certain conditions, an attacker with the ability to redirect users to a malicious site via an open redirect on a trusted site, may be able to spoof the address bar contents. This can lead to a malicious site to appear to have the same URL as the trusted site. *This bug only affects Firefox for Android. Other versions of Firefox are unaffected.* This vulnerability affects Firefox for Android < 130.0.1.

CVSS3: 6.1
10%
Средний
больше 1 года назад
github логотип
GHSA-hj55-p279-fxpp

The HTTP/2 implementation in Mozilla Firefox before 43.0 allows remote attackers to cause a denial of service (integer underflow, assertion failure, and application exit) via a malformed PushPromise frame that triggers decompressed-buffer length miscalculation and incorrect memory allocation.

1%
Низкий
больше 3 лет назад
github логотип
GHSA-hhwp-x6c3-m33w

Firefox 1.0.3 and 1.0.4, and Netscape 8.0.2, allows remote attackers to execute arbitrary code by tricking the user into using the "Set As Wallpaper" (in Firefox) or "Set as Background" (in Netscape) context menu on an image URL that is really a javascript: URL with an eval statement, aka "Firewalling."

16%
Средний
почти 4 года назад
github логотип
GHSA-hhpx-96r3-vcrp

When browsing a document hosted on an IP address, an attacker could insert certain characters to flip domain and path information in the address bar. This vulnerability affects Firefox < 77.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-hh4w-c577-5gx4

The PLUGINSPAGE functionality in Mozilla Firefox before 1.5.0.4 allows remote user-assisted attackers to execute privileged code by tricking a user into installing missing plugins and selecting the "Manual Install" button, then using nested javascript: URLs. NOTE: the manual install button is used for downloading software from a remote web site, so this issue would not cross privilege boundaries if the user progresses to the point of installing malicious software from the attacker-controlled site.

4%
Низкий
почти 4 года назад
github логотип
GHSA-hgp6-pgqq-pp4q

The ReadbackResultWriterD3D11::Run function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 misinterprets the return value of a function call, which might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.

3%
Низкий
больше 3 лет назад
github логотип
GHSA-hgfv-gvcw-686v

A content security policy (CSP) "frame-ancestors" directive containing origins with paths allows for comparisons against those paths instead of the origin. This results in a cross-origin information leak of this path information. This vulnerability affects Firefox < 55.

CVSS3: 5.3
0%
Низкий
больше 3 лет назад
github логотип
GHSA-hg6x-mmgv-6qvx

The filename appearing in the "Downloads" panel improperly renders some Unicode characters, allowing for the file name to be spoofed. This can be used to obscure the file extension of potentially executable files from user view in the panel. Note: the dialog to open the file will show the full, correct filename and whether it is executable or not. This vulnerability affects Firefox < 60.

CVSS3: 5.3
1%
Низкий
больше 3 лет назад
github логотип
GHSA-hfq5-47x3-ghhc

The user interface event dispatcher in Mozilla Firefox 3.0.3 on Windows XP SP2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a series of keypress, click, onkeydown, onkeyup, onmousedown, and onmouseup events. NOTE: it was later reported that Firefox 3.0.2 on Mac OS X 10.5 is also affected.

7%
Низкий
почти 4 года назад
github логотип
GHSA-hf84-87fj-v8xv

Under certain circumstances the "fetch()" API can return transient local copies of resources that were sent with a "no-store" or "no-cache" cache header instead of downloading a copy from the network as it should. This can result in previously stored, locally cached data of a website being accessible to users if they share a common profile while browsing. This vulnerability affects Firefox ESR < 52.7 and Firefox < 59.

CVSS3: 5.9
1%
Низкий
больше 3 лет назад
github логотип
GHSA-hf6r-227w-qwf9

In certain cases, SNI could have been sent unencrypted even when encrypted DNS was enabled. This vulnerability affects Firefox < 139.

CVSS3: 7.5
0%
Низкий
8 месяцев назад
github логотип
GHSA-hf5c-hjgx-rmrw

It was possible to mutate a JavaScript object so that the JIT could crash while tracing it. This vulnerability affects Firefox < 125.

CVSS3: 7.5
0%
Низкий
почти 2 года назад
github логотип
GHSA-hcmc-w4r8-h827

Mozilla Firefox 3.0 beta 5 allows remote attackers to cause a denial of service (application crash) via JavaScript code that calls document.write in an infinite loop.

1%
Низкий
почти 4 года назад
github логотип
GHSA-hcj3-374q-57xq

The nsExternalAppHandler::SetUpTempFile function in Mozilla Firefox 1.5.0.9 creates temporary files with predictable filenames based on creation time, which allows remote attackers to execute arbitrary web script or HTML via a crafted XMLHttpRequest.

1%
Низкий
почти 4 года назад
github логотип
GHSA-hc8c-44hv-5hc7

In 32-bit versions of Firefox, the Adobe Flash plugin setting for "Enable Adobe Flash protected mode" is unchecked by default even though the Adobe Flash sandbox is actually enabled. The displayed state is the reverse of the true setting, resulting in user confusion. This could cause users to select this setting intending to activate it and inadvertently turn protections off. This vulnerability affects Firefox < 60.

CVSS3: 5.3
1%
Низкий
больше 3 лет назад

Уязвимостей на страницу