Логотип exploitDog
product: "firefox"
Консоль
Логотип exploitDog

exploitDog

product: "firefox"

Количество 15 501

Количество 15 501

github логотип

GHSA-fpw8-4262-vxvh

почти 4 года назад

Cross-site scripting (XSS) vulnerability in Mozilla Firefox 2.0, when UTF-7 document content is rendered directly in UTF-7, allows remote attackers to inject arbitrary web script or HTML via a gopher URI that uses '/' (slash) characters to delimit a literal string within an XSS sequence, a related issue to CVE-2007-5414.

EPSS: Низкий
github логотип

GHSA-fpp8-6gxj-v3pg

больше 2 лет назад

When opening a page in reader mode, the redirect URL could have caused attacker-controlled script to execute in a reflected Cross-Site Scripting (XSS) attack. This vulnerability affects Firefox for iOS < 119.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-fpjx-8wc2-5w5g

больше 3 лет назад

Race condition in the Mozilla Maintenance Service in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 on Windows allows local users to write to arbitrary files and consequently gain privileges via vectors involving a hard link to a log file during an update.

EPSS: Низкий
github логотип

GHSA-fp7v-m5c3-w328

больше 3 лет назад

A crash and out-of-bounds read can occur when the buffer of a texture client is freed while it is still in use during graphic operations. This results is a potentially exploitable crash and the possibility of reading from the memory of the freed buffers. This vulnerability affects Firefox < 65.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-fmq6-m827-77jc

больше 3 лет назад

If a wildcard ('*') is specified for the host in Content Security Policy (CSP) directives, any port or path restriction of the directive will be ignored, leading to CSP directives not being properly applied to content. This vulnerability affects Firefox < 69.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-fjj5-r59g-88g7

8 месяцев назад

Due to insufficient escaping of the ampersand character in the “Copy as cURL” feature, an attacker could trick a user into using this command, potentially leading to local code execution on the user's system. *This bug only affects Firefox for Windows. Other versions of Firefox are unaffected.* This vulnerability affects Firefox < 139, Firefox ESR < 115.24, and Firefox ESR < 128.11.

CVSS3: 4.8
EPSS: Низкий
github логотип

GHSA-fhj6-r884-6jpv

больше 3 лет назад

When processing surfaces, the lifetime may outlive a persistent buffer leading to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 81.

EPSS: Низкий
github логотип

GHSA-fgxx-ch38-43gw

больше 3 лет назад

The existence of a specifically requested local file can be found due to the double firing of the "onerror" when the "source" attribute on a "<track>" tag refers to a file that does not exist if the source page is loaded locally. This vulnerability affects Firefox < 51.

CVSS3: 3.3
EPSS: Низкий
github логотип

GHSA-fgp4-57f9-xv7x

почти 4 года назад

Firefox 1.5.0.1 allows remote attackers to spoof the address bar and possibly conduct phishing attacks by re-opening the window to a malicious Shockwave Flash application, then changing the window location back to a trusted URL while the Flash application is still loading. NOTE: a followup was unable to replicate this issue.

EPSS: Низкий
github логотип

GHSA-fgj8-79hw-hmwq

больше 3 лет назад

Mozilla Firefox 4.x through 13.0 and Firefox ESR 10.x before 10.0.6 do not have the same context-menu restrictions for data: URLs as for javascript: URLs, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL.

EPSS: Низкий
github логотип

GHSA-ffhj-vphp-4358

почти 4 года назад

Mozilla Firefox 3.0.5 and earlier 3.0.x versions, when designMode is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a certain (a) replaceChild or (b) removeChild call, followed by a (1) queryCommandValue, (2) queryCommandState, or (3) queryCommandIndeterm call. NOTE: it was later reported that 3.0.6 and 3.0.7 are also affected.

EPSS: Средний
github логотип

GHSA-ffh4-92gv-qvv5

больше 1 года назад

When browsing private tabs, some data related to location history or webpage thumbnails could be persisted incorrectly within the sandboxed app bundle after app termination This vulnerability affects Firefox for iOS < 127.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-ff4q-8rgg-cv6g

около 2 месяцев назад

Memory safety bugs present in Firefox 146. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 146.0.1.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-fcvp-2grf-8j6r

почти 4 года назад

Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.3 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.

EPSS: Низкий
github логотип

GHSA-fcrm-w52m-c99v

почти 4 года назад

Mozilla Firefox before 2.0.0.5, when run on Windows, allows remote attackers to bypass file type checks and possibly execute programs via a (1) file:/// or (2) resource: URI with a dangerous extension, followed by a NULL byte (%00) and a safer extension, which causes Firefox to treat the requested file differently than Windows would.

EPSS: Низкий
github логотип

GHSA-fc8f-jhcw-p24v

около 3 лет назад

Remote Agent, used in WebDriver, did not validate the Host or Origin headers. This could have allowed websites to connect back locally to the user's browser to control it. <br>*This bug only affected Firefox when WebDriver was enabled, which is not the default configuration.*. This vulnerability affects Firefox < 97.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-f9x2-983g-532w

больше 3 лет назад

A use-after-free vulnerability can occur in AssertWorkerThread due to a race condition with shared workers. This results in a potentially exploitable crash. This vulnerability affects Firefox < 67.

EPSS: Низкий
github логотип

GHSA-f985-cwrv-f4qp

почти 2 года назад

An out-of-memory condition during object initialization could result in an empty shape list. If the JIT subsequently traced the object it would crash. This vulnerability affects Firefox < 125.

CVSS3: 6.2
EPSS: Низкий
github логотип

GHSA-f984-9xfw-9437

больше 3 лет назад

A rogue webpage could override the injected WKUserScript used by the logins autofill, this exploit could result in leaking a password for the current domain. This vulnerability affects Firefox for iOS < 28.

EPSS: Низкий
github логотип

GHSA-f8v9-9j4r-5fw9

больше 3 лет назад

The web console and JavaScript debugger do not sanitize all output that can be hyperlinked. Both will display "chrome:" links as active, clickable hyperlinks in their output. Web sites should not be able to directly link to internal chrome pages. Additionally, the JavaScript debugger will display "javascript:" links, which users could be tricked into clicking by malicious sites. This vulnerability affects Firefox < 60.

CVSS3: 4.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-fpw8-4262-vxvh

Cross-site scripting (XSS) vulnerability in Mozilla Firefox 2.0, when UTF-7 document content is rendered directly in UTF-7, allows remote attackers to inject arbitrary web script or HTML via a gopher URI that uses '/' (slash) characters to delimit a literal string within an XSS sequence, a related issue to CVE-2007-5414.

0%
Низкий
почти 4 года назад
github логотип
GHSA-fpp8-6gxj-v3pg

When opening a page in reader mode, the redirect URL could have caused attacker-controlled script to execute in a reflected Cross-Site Scripting (XSS) attack. This vulnerability affects Firefox for iOS < 119.

CVSS3: 6.1
0%
Низкий
больше 2 лет назад
github логотип
GHSA-fpjx-8wc2-5w5g

Race condition in the Mozilla Maintenance Service in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 on Windows allows local users to write to arbitrary files and consequently gain privileges via vectors involving a hard link to a log file during an update.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-fp7v-m5c3-w328

A crash and out-of-bounds read can occur when the buffer of a texture client is freed while it is still in use during graphic operations. This results is a potentially exploitable crash and the possibility of reading from the memory of the freed buffers. This vulnerability affects Firefox < 65.

CVSS3: 9.8
3%
Низкий
больше 3 лет назад
github логотип
GHSA-fmq6-m827-77jc

If a wildcard ('*') is specified for the host in Content Security Policy (CSP) directives, any port or path restriction of the directive will be ignored, leading to CSP directives not being properly applied to content. This vulnerability affects Firefox < 69.

CVSS3: 5.3
0%
Низкий
больше 3 лет назад
github логотип
GHSA-fjj5-r59g-88g7

Due to insufficient escaping of the ampersand character in the “Copy as cURL” feature, an attacker could trick a user into using this command, potentially leading to local code execution on the user's system. *This bug only affects Firefox for Windows. Other versions of Firefox are unaffected.* This vulnerability affects Firefox < 139, Firefox ESR < 115.24, and Firefox ESR < 128.11.

CVSS3: 4.8
0%
Низкий
8 месяцев назад
github логотип
GHSA-fhj6-r884-6jpv

When processing surfaces, the lifetime may outlive a persistent buffer leading to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 81.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-fgxx-ch38-43gw

The existence of a specifically requested local file can be found due to the double firing of the "onerror" when the "source" attribute on a "<track>" tag refers to a file that does not exist if the source page is loaded locally. This vulnerability affects Firefox < 51.

CVSS3: 3.3
0%
Низкий
больше 3 лет назад
github логотип
GHSA-fgp4-57f9-xv7x

Firefox 1.5.0.1 allows remote attackers to spoof the address bar and possibly conduct phishing attacks by re-opening the window to a malicious Shockwave Flash application, then changing the window location back to a trusted URL while the Flash application is still loading. NOTE: a followup was unable to replicate this issue.

0%
Низкий
почти 4 года назад
github логотип
GHSA-fgj8-79hw-hmwq

Mozilla Firefox 4.x through 13.0 and Firefox ESR 10.x before 10.0.6 do not have the same context-menu restrictions for data: URLs as for javascript: URLs, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL.

1%
Низкий
больше 3 лет назад
github логотип
GHSA-ffhj-vphp-4358

Mozilla Firefox 3.0.5 and earlier 3.0.x versions, when designMode is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a certain (a) replaceChild or (b) removeChild call, followed by a (1) queryCommandValue, (2) queryCommandState, or (3) queryCommandIndeterm call. NOTE: it was later reported that 3.0.6 and 3.0.7 are also affected.

10%
Средний
почти 4 года назад
github логотип
GHSA-ffh4-92gv-qvv5

When browsing private tabs, some data related to location history or webpage thumbnails could be persisted incorrectly within the sandboxed app bundle after app termination This vulnerability affects Firefox for iOS < 127.

CVSS3: 6.5
0%
Низкий
больше 1 года назад
github логотип
GHSA-ff4q-8rgg-cv6g

Memory safety bugs present in Firefox 146. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 146.0.1.

CVSS3: 8.8
0%
Низкий
около 2 месяцев назад
github логотип
GHSA-fcvp-2grf-8j6r

Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.3 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.

5%
Низкий
почти 4 года назад
github логотип
GHSA-fcrm-w52m-c99v

Mozilla Firefox before 2.0.0.5, when run on Windows, allows remote attackers to bypass file type checks and possibly execute programs via a (1) file:/// or (2) resource: URI with a dangerous extension, followed by a NULL byte (%00) and a safer extension, which causes Firefox to treat the requested file differently than Windows would.

2%
Низкий
почти 4 года назад
github логотип
GHSA-fc8f-jhcw-p24v

Remote Agent, used in WebDriver, did not validate the Host or Origin headers. This could have allowed websites to connect back locally to the user's browser to control it. <br>*This bug only affected Firefox when WebDriver was enabled, which is not the default configuration.*. This vulnerability affects Firefox < 97.

CVSS3: 6.5
0%
Низкий
около 3 лет назад
github логотип
GHSA-f9x2-983g-532w

A use-after-free vulnerability can occur in AssertWorkerThread due to a race condition with shared workers. This results in a potentially exploitable crash. This vulnerability affects Firefox < 67.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-f985-cwrv-f4qp

An out-of-memory condition during object initialization could result in an empty shape list. If the JIT subsequently traced the object it would crash. This vulnerability affects Firefox < 125.

CVSS3: 6.2
0%
Низкий
почти 2 года назад
github логотип
GHSA-f984-9xfw-9437

A rogue webpage could override the injected WKUserScript used by the logins autofill, this exploit could result in leaking a password for the current domain. This vulnerability affects Firefox for iOS < 28.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-f8v9-9j4r-5fw9

The web console and JavaScript debugger do not sanitize all output that can be hyperlinked. Both will display "chrome:" links as active, clickable hyperlinks in their output. Web sites should not be able to directly link to internal chrome pages. Additionally, the JavaScript debugger will display "javascript:" links, which users could be tricked into clicking by malicious sites. This vulnerability affects Firefox < 60.

CVSS3: 4.3
1%
Низкий
больше 3 лет назад

Уязвимостей на страницу