Логотип exploitDog
product: "firefox"
Консоль
Логотип exploitDog

exploitDog

product: "firefox"

Количество 15 501

Количество 15 501

github логотип

GHSA-h2wp-qp38-rjj4

больше 3 лет назад

Mozilla developers reported memory safety bugs present in Firefox 85. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 86.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-h2q7-pj3w-pr6f

почти 4 года назад

components/sessionstore/src/nsSessionStore.js in Mozilla Firefox before 3.0.6 does not block changes of INPUT elements to type="file" during tab restoration, which allows user-assisted remote attackers to read arbitrary files on a client machine via a crafted INPUT element.

EPSS: Низкий
github логотип

GHSA-h295-679q-mhm8

около 3 лет назад

Using the <code>S.browser_fallback_url parameter</code> parameter, an attacker could redirect a user to a URL and cause SameSite=Strict cookies to be sent.<br>*This issue only affects Firefox for Android. Other operating systems are not affected.*. This vulnerability affects Firefox < 107.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-gx87-4m2g-vcf2

больше 3 лет назад

Mozilla developers reported memory safety bugs present in Firefox 72. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 73.

EPSS: Низкий
github логотип

GHSA-gx64-jm35-rwvr

около 3 лет назад

Within the <code>lg_init()</code> function, if several allocations succeed but then one fails, an uninitialized pointer would have been freed despite never being allocated. This vulnerability affects Firefox < 102.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-gx4h-qpc9-477w

больше 3 лет назад

JavaScript can be injected into an exported bookmarks file by placing JavaScript code into user-supplied tags in saved bookmarks. If the resulting exported HTML file is later opened in a browser this JavaScript will be executed. This could be used in social engineering and self-cross-site-scripting (self-XSS) attacks if users were convinced to add malicious tags to bookmarks, export them, and then open the resulting file. This vulnerability affects Firefox < 57.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-gwxw-rj4r-jxqv

больше 2 лет назад

Uploading files which contain symlinks may have allowed an attacker to trick a user into submitting sensitive data to a malicious website. This vulnerability affects Firefox < 115.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-gwmw-74gj-55qx

почти 4 года назад

Mozilla Firefox before 3.0.12, and 3.5.x before 3.5.2, allows remote SOCKS5 proxy servers to cause a denial of service (data stream corruption) via a long domain name in a reply.

EPSS: Низкий
github логотип

GHSA-gwj9-96vr-3q8g

больше 3 лет назад

The Buffer11::NativeBuffer11::map function in ANGLE, as used in Mozilla Firefox before 44.0, might allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-gwf4-vcvc-4rjv

5 месяцев назад

This vulnerability affects Firefox < 143.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-gwc9-8q5h-cr4c

больше 2 лет назад

Mozilla developers and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 108. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 109.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-gw86-c7x2-pwcr

больше 3 лет назад

Mozilla developers reported memory safety and script safety bugs present in Firefox 73. Some of these bugs showed evidence of memory corruption or escalation of privilege and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 74.

EPSS: Низкий
github логотип

GHSA-gvh4-3r7j-cv8q

больше 3 лет назад

Mozilla Firefox before 44.0.2 does not properly restrict the interaction between Service Workers and plugins, which allows remote attackers to bypass the Same Origin Policy via a crafted web site that triggers spoofed responses to requests that use NPAPI, as demonstrated by a request for a crossdomain.xml file.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-gvgq-xwmc-59cp

больше 3 лет назад

The UITour::onPageEvent function in Mozilla Firefox before 36.0 does not ensure that an API call originates from a foreground tab, which allows remote attackers to conduct spoofing and clickjacking attacks by leveraging access to a UI Tour web site.

EPSS: Низкий
github логотип

GHSA-gv5g-5832-j3rm

почти 2 года назад

An attacker was able to perform an out-of-bounds read or write on a JavaScript object by fooling range-based bounds check elimination. This vulnerability affects Firefox < 124.0.1.

CVSS3: 9.8
EPSS: Средний
github логотип

GHSA-grmx-f2j7-2qwf

больше 3 лет назад

Multiple integer overflows in libstagefright in Mozilla Firefox before 38.0 allow remote attackers to execute arbitrary code via crafted sample metadata in an MPEG-4 video file, a related issue to CVE-2015-1538.

EPSS: Низкий
github логотип

GHSA-gqx4-7r84-32m6

11 месяцев назад

A select option could partially obscure the confirmation prompt shown before launching external apps. This could be used to trick a user in to launching an external app unexpectedly. *This issue only affects Android versions of Firefox.* This vulnerability affects Firefox < 136.

CVSS3: 7.1
EPSS: Низкий
github логотип

GHSA-gqrh-wgmr-mm7v

почти 2 года назад

The `fetch()` API and navigation incorrectly shared the same cache, as the cache key did not include the optional headers `fetch()` may contain. Under the correct circumstances, an attacker may have been able to poison the local browser cache by priming it with a `fetch()` response controlled by the additional headers. Upon navigation to the same URL, the user would see the cached response instead of the expected response. This vulnerability affects Firefox < 123.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-gqgp-p5w7-3298

почти 4 года назад

Firefox 1.0 allows remote attackers to modify Boolean configuration parameters for the about:config site by using a plugin such as Flash, and the -moz-opacity filter, to display the about:config site then cause the user to double-click at a certain screen position, aka "Fireflashing."

EPSS: Низкий
github логотип

GHSA-gqgc-5jm8-qf2w

больше 3 лет назад

Incorrect bookkeeping of functions inlined during JIT compilation could have led to memory corruption and a potentially exploitable crash when handling out-of-memory errors. This vulnerability affects Firefox < 83.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-h2wp-qp38-rjj4

Mozilla developers reported memory safety bugs present in Firefox 85. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 86.

CVSS3: 8.8
0%
Низкий
больше 3 лет назад
github логотип
GHSA-h2q7-pj3w-pr6f

components/sessionstore/src/nsSessionStore.js in Mozilla Firefox before 3.0.6 does not block changes of INPUT elements to type="file" during tab restoration, which allows user-assisted remote attackers to read arbitrary files on a client machine via a crafted INPUT element.

2%
Низкий
почти 4 года назад
github логотип
GHSA-h295-679q-mhm8

Using the <code>S.browser_fallback_url parameter</code> parameter, an attacker could redirect a user to a URL and cause SameSite=Strict cookies to be sent.<br>*This issue only affects Firefox for Android. Other operating systems are not affected.*. This vulnerability affects Firefox < 107.

CVSS3: 6.1
0%
Низкий
около 3 лет назад
github логотип
GHSA-gx87-4m2g-vcf2

Mozilla developers reported memory safety bugs present in Firefox 72. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 73.

1%
Низкий
больше 3 лет назад
github логотип
GHSA-gx64-jm35-rwvr

Within the <code>lg_init()</code> function, if several allocations succeed but then one fails, an uninitialized pointer would have been freed despite never being allocated. This vulnerability affects Firefox < 102.

CVSS3: 8.8
0%
Низкий
около 3 лет назад
github логотип
GHSA-gx4h-qpc9-477w

JavaScript can be injected into an exported bookmarks file by placing JavaScript code into user-supplied tags in saved bookmarks. If the resulting exported HTML file is later opened in a browser this JavaScript will be executed. This could be used in social engineering and self-cross-site-scripting (self-XSS) attacks if users were convinced to add malicious tags to bookmarks, export them, and then open the resulting file. This vulnerability affects Firefox < 57.

CVSS3: 6.1
1%
Низкий
больше 3 лет назад
github логотип
GHSA-gwxw-rj4r-jxqv

Uploading files which contain symlinks may have allowed an attacker to trick a user into submitting sensitive data to a malicious website. This vulnerability affects Firefox < 115.

CVSS3: 6.5
0%
Низкий
больше 2 лет назад
github логотип
GHSA-gwmw-74gj-55qx

Mozilla Firefox before 3.0.12, and 3.5.x before 3.5.2, allows remote SOCKS5 proxy servers to cause a denial of service (data stream corruption) via a long domain name in a reply.

3%
Низкий
почти 4 года назад
github логотип
GHSA-gwj9-96vr-3q8g

The Buffer11::NativeBuffer11::map function in ANGLE, as used in Mozilla Firefox before 44.0, might allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.

CVSS3: 9.8
3%
Низкий
больше 3 лет назад
github логотип
GHSA-gwf4-vcvc-4rjv

This vulnerability affects Firefox < 143.

CVSS3: 7.5
0%
Низкий
5 месяцев назад
github логотип
GHSA-gwc9-8q5h-cr4c

Mozilla developers and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 108. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 109.

CVSS3: 8.8
0%
Низкий
больше 2 лет назад
github логотип
GHSA-gw86-c7x2-pwcr

Mozilla developers reported memory safety and script safety bugs present in Firefox 73. Some of these bugs showed evidence of memory corruption or escalation of privilege and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 74.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-gvh4-3r7j-cv8q

Mozilla Firefox before 44.0.2 does not properly restrict the interaction between Service Workers and plugins, which allows remote attackers to bypass the Same Origin Policy via a crafted web site that triggers spoofed responses to requests that use NPAPI, as demonstrated by a request for a crossdomain.xml file.

CVSS3: 8.8
1%
Низкий
больше 3 лет назад
github логотип
GHSA-gvgq-xwmc-59cp

The UITour::onPageEvent function in Mozilla Firefox before 36.0 does not ensure that an API call originates from a foreground tab, which allows remote attackers to conduct spoofing and clickjacking attacks by leveraging access to a UI Tour web site.

1%
Низкий
больше 3 лет назад
github логотип
GHSA-gv5g-5832-j3rm

An attacker was able to perform an out-of-bounds read or write on a JavaScript object by fooling range-based bounds check elimination. This vulnerability affects Firefox < 124.0.1.

CVSS3: 9.8
51%
Средний
почти 2 года назад
github логотип
GHSA-grmx-f2j7-2qwf

Multiple integer overflows in libstagefright in Mozilla Firefox before 38.0 allow remote attackers to execute arbitrary code via crafted sample metadata in an MPEG-4 video file, a related issue to CVE-2015-1538.

2%
Низкий
больше 3 лет назад
github логотип
GHSA-gqx4-7r84-32m6

A select option could partially obscure the confirmation prompt shown before launching external apps. This could be used to trick a user in to launching an external app unexpectedly. *This issue only affects Android versions of Firefox.* This vulnerability affects Firefox < 136.

CVSS3: 7.1
0%
Низкий
11 месяцев назад
github логотип
GHSA-gqrh-wgmr-mm7v

The `fetch()` API and navigation incorrectly shared the same cache, as the cache key did not include the optional headers `fetch()` may contain. Under the correct circumstances, an attacker may have been able to poison the local browser cache by priming it with a `fetch()` response controlled by the additional headers. Upon navigation to the same URL, the user would see the cached response instead of the expected response. This vulnerability affects Firefox < 123.

CVSS3: 9.8
0%
Низкий
почти 2 года назад
github логотип
GHSA-gqgp-p5w7-3298

Firefox 1.0 allows remote attackers to modify Boolean configuration parameters for the about:config site by using a plugin such as Flash, and the -moz-opacity filter, to display the about:config site then cause the user to double-click at a certain screen position, aka "Fireflashing."

1%
Низкий
почти 4 года назад
github логотип
GHSA-gqgc-5jm8-qf2w

Incorrect bookkeeping of functions inlined during JIT compilation could have led to memory corruption and a potentially exploitable crash when handling out-of-memory errors. This vulnerability affects Firefox < 83.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу