Логотип exploitDog
product: "firefox"
Консоль
Логотип exploitDog

exploitDog

product: "firefox"

Количество 15 501

Количество 15 501

github логотип

GHSA-gpx3-xw93-vw67

почти 4 года назад

Mozilla Firefox 2.0.0.3 does not check URLs embedded in (1) object or (2) iframe HTML tags against the phishing site blacklist, which allows remote attackers to bypass phishing protection.

EPSS: Низкий
github логотип

GHSA-gpjh-cmj6-fjw9

больше 3 лет назад

Mozilla Firefox before 41.0 does not properly restrict the availability of High Resolution Time API times, which allows remote attackers to track last-level cache access, and consequently obtain sensitive information, via crafted JavaScript code that makes performance.now calls.

EPSS: Низкий
github логотип

GHSA-gphq-fwm7-x5g2

больше 3 лет назад

A VideoStreamEncoder may have been freed in a race condition with VideoBroadcaster::AddOrUpdateSink, resulting in a use-after-free, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox < 78.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-gmxm-22mx-7m9q

больше 3 лет назад

Mozilla Firefox before 44.0 on Android allows remote attackers to spoof the address bar via the scrollTo method.

CVSS3: 4.7
EPSS: Низкий
github логотип

GHSA-gjrg-r3r9-354j

больше 3 лет назад

Mozilla Firefox before 37.0 relies on docshell type information instead of page principal information for Window.webidl access control, which might allow remote attackers to execute arbitrary JavaScript code with chrome privileges via certain content navigation that leverages the reachability of a privileged window with an unintended persistence of access to restricted internal methods.

EPSS: Высокий
github логотип

GHSA-gjm7-37ww-4jrc

больше 3 лет назад

Malicious sites can display a spoofed location bar on a subsequently loaded page when the existing location bar on the new page is scrolled out of view if navigations between pages can be timed correctly. Note: This issue only affects Firefox for Android. Other operating systems are not affected. This vulnerability affects Firefox < 51.

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-gj3g-3mmj-f53j

почти 4 года назад

Multiple unspecified vulnerabilities in liboggz before cf5feeaab69b05e24, as used in Mozilla Firefox 3.5.x before 3.5.4, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors.

EPSS: Низкий
github логотип

GHSA-ghxv-675w-53v8

3 месяца назад

Race condition in the Graphics component. This vulnerability affects Firefox < 145, Firefox ESR < 140.5, and Firefox ESR < 115.30.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-ghv2-cp6r-w334

больше 3 лет назад

When protecting CSS blocks with the nonce feature of Content Security Policy, the @import statement in the CSS block could allow an attacker to inject arbitrary styles, bypassing the intent of the Content Security Policy. This vulnerability affects Firefox < 74.

EPSS: Низкий
github логотип

GHSA-ghgm-jxvv-79f5

больше 3 лет назад

Data sent with in multipart channels, such as the multipart/x-mixed-replace MIME type, will ignore the referrer-policy response header, leading to potential information disclosure for sites using this header. This vulnerability affects Firefox < 51.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-gh9h-87wv-w3qc

больше 3 лет назад

The printing process can bypass local access protections to read files available through symlinks, bypassing local file restrictions. The printing process requires files in a specific format so arbitrary data cannot be read but it is possible that some local file information could be exposed. This vulnerability affects Firefox < 58.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-gh5c-2j93-h8q7

почти 4 года назад

Mozilla Firefox 1.5.0.2, when designMode is enabled, allows remote attackers to cause a denial of service and possibly execute arbitrary code via certain Javascript that is not properly handled by the contentWindow.focus method in an iframe, which causes a reference to a deleted controller context object. NOTE: this was originally claimed to be a buffer overflow in (1) js320.dll and (2) xpcom_core.dll, but the vendor disputes this claim.

EPSS: Средний
github логотип

GHSA-ggqr-5458-x5c8

больше 3 лет назад

The internal WebBrowserPersist code does not use correct origin context for a resource being saved. This manifests when sub-resources are loaded as part of "Save Page As..." functionality. For example, a malicious page could recover a visitor's Windows username and NTLM hash by including resources otherwise unreachable to the malicious page, if they can convince the visitor to save the complete web page. Similarly, SameSite cookies are sent on cross-origin requests when the "Save Page As..." menu item is selected to save a page, which can result in saving the wrong version of resources based on those cookies. This vulnerability affects Firefox < 63.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-gggj-wf35-2jxg

больше 3 лет назад

Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 46.0 and Firefox ESR 45.x before 45.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-ggcg-3gxc-wwr4

больше 3 лет назад

Use-after-free vulnerability in the nsEventListenerManager::CompileEventHandlerInternal function in the Event Listener Manager in Mozilla Firefox before 30.0 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via crafted web content.

EPSS: Низкий
github логотип

GHSA-gg89-f9mq-2rw9

больше 2 лет назад

A hashtable in the Ion Engine could have been mutated while there was a live interior reference, leading to a potential use-after-free and exploitable crash. This vulnerability affects Firefox < 118.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-gfv8-8p3g-4px7

больше 3 лет назад

Mozilla Firefox 43.x mishandles attempts to connect to the Application Reputation service, which makes it easier for remote attackers to trigger an unintended download by leveraging the absence of reputation data.

CVSS3: 4.7
EPSS: Низкий
github логотип

GHSA-gfgx-4754-9hhp

больше 1 года назад

If an out-of-memory condition occurs at a specific point using allocations in the probabilistic heap checker, an assertion could have been triggered, and in rarer situations, memory corruption could have occurred. This vulnerability affects Firefox < 127.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-gf3r-ccj6-h68v

больше 3 лет назад

Mozilla Firefox before 49.0 does not properly restrict the scheme in favicon requests, which might allow remote attackers to obtain sensitive information via unspecified vectors, as demonstrated by a jar: URL for a favicon resource.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-gcqc-q8hp-chc7

почти 4 года назад

** DISPUTED ** Mozilla Firefox 2.0.0.4 allows remote attackers to cause a denial of service by opening multiple tabs in a popup window. NOTE: this issue has been disputed by third party researchers, stating that "this does not crash on me, and I can't see a likely mechanism of action that would lead to a DoS condition."

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-gpx3-xw93-vw67

Mozilla Firefox 2.0.0.3 does not check URLs embedded in (1) object or (2) iframe HTML tags against the phishing site blacklist, which allows remote attackers to bypass phishing protection.

0%
Низкий
почти 4 года назад
github логотип
GHSA-gpjh-cmj6-fjw9

Mozilla Firefox before 41.0 does not properly restrict the availability of High Resolution Time API times, which allows remote attackers to track last-level cache access, and consequently obtain sensitive information, via crafted JavaScript code that makes performance.now calls.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-gphq-fwm7-x5g2

A VideoStreamEncoder may have been freed in a race condition with VideoBroadcaster::AddOrUpdateSink, resulting in a use-after-free, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox < 78.

CVSS3: 8.8
1%
Низкий
больше 3 лет назад
github логотип
GHSA-gmxm-22mx-7m9q

Mozilla Firefox before 44.0 on Android allows remote attackers to spoof the address bar via the scrollTo method.

CVSS3: 4.7
1%
Низкий
больше 3 лет назад
github логотип
GHSA-gjrg-r3r9-354j

Mozilla Firefox before 37.0 relies on docshell type information instead of page principal information for Window.webidl access control, which might allow remote attackers to execute arbitrary JavaScript code with chrome privileges via certain content navigation that leverages the reachability of a privileged window with an unintended persistence of access to restricted internal methods.

80%
Высокий
больше 3 лет назад
github логотип
GHSA-gjm7-37ww-4jrc

Malicious sites can display a spoofed location bar on a subsequently loaded page when the existing location bar on the new page is scrolled out of view if navigations between pages can be timed correctly. Note: This issue only affects Firefox for Android. Other operating systems are not affected. This vulnerability affects Firefox < 51.

CVSS3: 4.3
0%
Низкий
больше 3 лет назад
github логотип
GHSA-gj3g-3mmj-f53j

Multiple unspecified vulnerabilities in liboggz before cf5feeaab69b05e24, as used in Mozilla Firefox 3.5.x before 3.5.4, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors.

8%
Низкий
почти 4 года назад
github логотип
GHSA-ghxv-675w-53v8

Race condition in the Graphics component. This vulnerability affects Firefox < 145, Firefox ESR < 140.5, and Firefox ESR < 115.30.

CVSS3: 7.5
0%
Низкий
3 месяца назад
github логотип
GHSA-ghv2-cp6r-w334

When protecting CSS blocks with the nonce feature of Content Security Policy, the @import statement in the CSS block could allow an attacker to inject arbitrary styles, bypassing the intent of the Content Security Policy. This vulnerability affects Firefox < 74.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-ghgm-jxvv-79f5

Data sent with in multipart channels, such as the multipart/x-mixed-replace MIME type, will ignore the referrer-policy response header, leading to potential information disclosure for sites using this header. This vulnerability affects Firefox < 51.

CVSS3: 7.5
1%
Низкий
больше 3 лет назад
github логотип
GHSA-gh9h-87wv-w3qc

The printing process can bypass local access protections to read files available through symlinks, bypassing local file restrictions. The printing process requires files in a specific format so arbitrary data cannot be read but it is possible that some local file information could be exposed. This vulnerability affects Firefox < 58.

CVSS3: 5.3
1%
Низкий
больше 3 лет назад
github логотип
GHSA-gh5c-2j93-h8q7

Mozilla Firefox 1.5.0.2, when designMode is enabled, allows remote attackers to cause a denial of service and possibly execute arbitrary code via certain Javascript that is not properly handled by the contentWindow.focus method in an iframe, which causes a reference to a deleted controller context object. NOTE: this was originally claimed to be a buffer overflow in (1) js320.dll and (2) xpcom_core.dll, but the vendor disputes this claim.

57%
Средний
почти 4 года назад
github логотип
GHSA-ggqr-5458-x5c8

The internal WebBrowserPersist code does not use correct origin context for a resource being saved. This manifests when sub-resources are loaded as part of "Save Page As..." functionality. For example, a malicious page could recover a visitor's Windows username and NTLM hash by including resources otherwise unreachable to the malicious page, if they can convince the visitor to save the complete web page. Similarly, SameSite cookies are sent on cross-origin requests when the "Save Page As..." menu item is selected to save a page, which can result in saving the wrong version of resources based on those cookies. This vulnerability affects Firefox < 63.

CVSS3: 6.5
0%
Низкий
больше 3 лет назад
github логотип
GHSA-gggj-wf35-2jxg

Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 46.0 and Firefox ESR 45.x before 45.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.

CVSS3: 8.8
2%
Низкий
больше 3 лет назад
github логотип
GHSA-ggcg-3gxc-wwr4

Use-after-free vulnerability in the nsEventListenerManager::CompileEventHandlerInternal function in the Event Listener Manager in Mozilla Firefox before 30.0 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via crafted web content.

1%
Низкий
больше 3 лет назад
github логотип
GHSA-gg89-f9mq-2rw9

A hashtable in the Ion Engine could have been mutated while there was a live interior reference, leading to a potential use-after-free and exploitable crash. This vulnerability affects Firefox < 118.

CVSS3: 9.8
0%
Низкий
больше 2 лет назад
github логотип
GHSA-gfv8-8p3g-4px7

Mozilla Firefox 43.x mishandles attempts to connect to the Application Reputation service, which makes it easier for remote attackers to trigger an unintended download by leveraging the absence of reputation data.

CVSS3: 4.7
1%
Низкий
больше 3 лет назад
github логотип
GHSA-gfgx-4754-9hhp

If an out-of-memory condition occurs at a specific point using allocations in the probabilistic heap checker, an assertion could have been triggered, and in rarer situations, memory corruption could have occurred. This vulnerability affects Firefox < 127.

CVSS3: 9.8
1%
Низкий
больше 1 года назад
github логотип
GHSA-gf3r-ccj6-h68v

Mozilla Firefox before 49.0 does not properly restrict the scheme in favicon requests, which might allow remote attackers to obtain sensitive information via unspecified vectors, as demonstrated by a jar: URL for a favicon resource.

CVSS3: 6.5
0%
Низкий
больше 3 лет назад
github логотип
GHSA-gcqc-q8hp-chc7

** DISPUTED ** Mozilla Firefox 2.0.0.4 allows remote attackers to cause a denial of service by opening multiple tabs in a popup window. NOTE: this issue has been disputed by third party researchers, stating that "this does not crash on me, and I can't see a likely mechanism of action that would lead to a DoS condition."

1%
Низкий
почти 4 года назад

Уязвимостей на страницу