Логотип exploitDog
product: "firefox"
Консоль
Логотип exploitDog

exploitDog

product: "firefox"

Количество 15 501

Количество 15 501

github логотип

GHSA-857q-6rrg-fqm2

больше 3 лет назад

If a text string that happens to be a filename in the operating system's native format is dragged and dropped onto the addressbar the specified local file will be opened. This is contrary to policy and is what would happen if the string were the equivalent "file:" URL. This vulnerability affects Firefox < 60.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-84qg-hv4f-j8w8

больше 3 лет назад

Mozilla Firefox before 41.0, when reader mode is enabled, allows remote attackers to spoof the relationship between address-bar URLs and web content via a crafted web site.

EPSS: Низкий
github логотип

GHSA-83qq-799j-gmvc

около 3 лет назад

Mozilla developers and community members Gabriele Svelto, Sebastian Hengst, Randell Jesup, Luan Herrera, Lars T Hansen, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 96. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 97.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-838w-vrg2-2x7q

больше 3 лет назад

Unspecified vulnerability in the plugin API in Mozilla Firefox 3.6.x before 3.6.23 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.

EPSS: Низкий
github логотип

GHSA-833r-vjfj-j25r

больше 3 лет назад

The WebGL implementation in Mozilla Firefox 4.x allows remote attackers to obtain screenshots of the windows of arbitrary desktop applications via vectors involving an SVG filter, an IFRAME element, and uninitialized data in graphics memory.

EPSS: Низкий
github логотип

GHSA-823q-pcrj-c4xv

8 месяцев назад

An attacker was able to bypass the `connect-src` directive of a Content Security Policy by manipulating subdocuments. This would have also hidden the connections from the Network tab in Devtools. This vulnerability affects Firefox < 140.

CVSS3: 9.1
EPSS: Низкий
github логотип

GHSA-7xcg-pmvr-6h7r

больше 3 лет назад

The Add-on SDK in Mozilla Firefox before 42.0 misinterprets a "script: false" panel setting, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via inline JavaScript code that is executed within a third-party extension.

EPSS: Низкий
github логотип

GHSA-7x69-7fj6-rqg6

почти 4 года назад

Remote code execution in the Venkman script debugger in Mozilla Firefox before 2.0.0.8.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-7ww8-h9c7-wx7c

почти 4 года назад

nsViewManager.cpp in Mozilla Firefox 3.0.2 through 3.0.10 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors related to interaction with TinyMCE.

EPSS: Низкий
github логотип

GHSA-7wrp-3pc5-gg9v

почти 4 года назад

Mozilla Firefox 3.0.6 through 3.0.13, and 3.5.x, allows remote attackers to cause a denial of service (CPU consumption) via JavaScript code with a long string value for the hash property (aka location.hash), a related issue to CVE-2008-5715.

EPSS: Низкий
github логотип

GHSA-7wr6-m3x7-mq75

почти 4 года назад

Mozilla Firefox before 2.0.0.12 does not always display a web forgery warning dialog if the entire contents of a web page are in a DIV tag that uses absolute positioning, which makes it easier for remote attackers to conduct phishing attacks.

EPSS: Низкий
github логотип

GHSA-7wmp-qghr-8g7f

больше 2 лет назад

When choosing a site-isolated process for a document loaded from a data: URL that was the result of a redirect, Firefox would load that document in the same process as the site that issued the redirect. This bypassed the site-isolation protections against Spectre-like attacks on sites that host an "open redirect". Firefox no longer follows HTTP redirects to data: URLs. This vulnerability affects Firefox < 114.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-7wjp-9g5c-9mjc

больше 3 лет назад

Untrusted search path vulnerability in the GL tracing functionality in Mozilla Firefox before 24.0 on Android allows attackers to execute arbitrary code via a Trojan horse .so file in a world-writable directory.

EPSS: Низкий
github логотип

GHSA-7w2r-8gq9-28xx

около 4 лет назад

When receiving a URL through a SEND intent, Firefox would have searched for the text, but subsequent usages of the address bar might have caused the URL to load unintentionally, which could lead to XSS and spoofing attacks. *This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 95.

EPSS: Низкий
github логотип

GHSA-7w2r-5rh4-3w9j

больше 3 лет назад

Mozilla Firefox before 37.0 on OS X does not ensure that the cursor is visible, which allows remote attackers to conduct clickjacking attacks via a Flash object in conjunction with DIV elements associated with layered presentation, and crafted JavaScript code that interacts with an IMG element.

EPSS: Низкий
github логотип

GHSA-7vm3-8xjm-5j9p

больше 3 лет назад

In non-standard configurations, a JPEG image created by JavaScript could have caused an internal variable to overflow, resulting in an out of bounds write, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox < 78.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-7vcp-35cw-vjp4

около 3 лет назад

An attacker who could have convinced a user to drag and drop an image to a filesystem could have manipulated the resulting filename to contain an executable extension, and by extension potentially tricked the user into executing malicious code. While very similar, this is a separate issue from CVE-2022-34483. This vulnerability affects Firefox < 102.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-7v9j-67p6-63jv

больше 3 лет назад

Mozilla Firefox 3.x before 3.0.5 allows remote attackers to bypass intended privacy restrictions by using the persist attribute in an XUL element to create and access data entities that are similar to cookies.

EPSS: Низкий
github логотип

GHSA-7rph-qq97-wqp5

9 месяцев назад

Due to insufficient escaping of the newline character in the “Copy as cURL” feature, an attacker could trick a user into using this command, potentially leading to local code execution on the user's system. This vulnerability affects Firefox < 139, Firefox ESR < 115.24, and Firefox ESR < 128.11.

CVSS3: 4.8
EPSS: Низкий
github логотип

GHSA-7r2j-86vj-vwvm

больше 3 лет назад

Memory safety bugs were reported in Firefox 56. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 57.

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-857q-6rrg-fqm2

If a text string that happens to be a filename in the operating system's native format is dragged and dropped onto the addressbar the specified local file will be opened. This is contrary to policy and is what would happen if the string were the equivalent "file:" URL. This vulnerability affects Firefox < 60.

CVSS3: 7.5
1%
Низкий
больше 3 лет назад
github логотип
GHSA-84qg-hv4f-j8w8

Mozilla Firefox before 41.0, when reader mode is enabled, allows remote attackers to spoof the relationship between address-bar URLs and web content via a crafted web site.

1%
Низкий
больше 3 лет назад
github логотип
GHSA-83qq-799j-gmvc

Mozilla developers and community members Gabriele Svelto, Sebastian Hengst, Randell Jesup, Luan Herrera, Lars T Hansen, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 96. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 97.

CVSS3: 8.8
0%
Низкий
около 3 лет назад
github логотип
GHSA-838w-vrg2-2x7q

Unspecified vulnerability in the plugin API in Mozilla Firefox 3.6.x before 3.6.23 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.

7%
Низкий
больше 3 лет назад
github логотип
GHSA-833r-vjfj-j25r

The WebGL implementation in Mozilla Firefox 4.x allows remote attackers to obtain screenshots of the windows of arbitrary desktop applications via vectors involving an SVG filter, an IFRAME element, and uninitialized data in graphics memory.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-823q-pcrj-c4xv

An attacker was able to bypass the `connect-src` directive of a Content Security Policy by manipulating subdocuments. This would have also hidden the connections from the Network tab in Devtools. This vulnerability affects Firefox < 140.

CVSS3: 9.1
0%
Низкий
8 месяцев назад
github логотип
GHSA-7xcg-pmvr-6h7r

The Add-on SDK in Mozilla Firefox before 42.0 misinterprets a "script: false" panel setting, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via inline JavaScript code that is executed within a third-party extension.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-7x69-7fj6-rqg6

Remote code execution in the Venkman script debugger in Mozilla Firefox before 2.0.0.8.

CVSS3: 9.8
2%
Низкий
почти 4 года назад
github логотип
GHSA-7ww8-h9c7-wx7c

nsViewManager.cpp in Mozilla Firefox 3.0.2 through 3.0.10 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors related to interaction with TinyMCE.

4%
Низкий
почти 4 года назад
github логотип
GHSA-7wrp-3pc5-gg9v

Mozilla Firefox 3.0.6 through 3.0.13, and 3.5.x, allows remote attackers to cause a denial of service (CPU consumption) via JavaScript code with a long string value for the hash property (aka location.hash), a related issue to CVE-2008-5715.

3%
Низкий
почти 4 года назад
github логотип
GHSA-7wr6-m3x7-mq75

Mozilla Firefox before 2.0.0.12 does not always display a web forgery warning dialog if the entire contents of a web page are in a DIV tag that uses absolute positioning, which makes it easier for remote attackers to conduct phishing attacks.

1%
Низкий
почти 4 года назад
github логотип
GHSA-7wmp-qghr-8g7f

When choosing a site-isolated process for a document loaded from a data: URL that was the result of a redirect, Firefox would load that document in the same process as the site that issued the redirect. This bypassed the site-isolation protections against Spectre-like attacks on sites that host an "open redirect". Firefox no longer follows HTTP redirects to data: URLs. This vulnerability affects Firefox < 114.

CVSS3: 6.1
0%
Низкий
больше 2 лет назад
github логотип
GHSA-7wjp-9g5c-9mjc

Untrusted search path vulnerability in the GL tracing functionality in Mozilla Firefox before 24.0 on Android allows attackers to execute arbitrary code via a Trojan horse .so file in a world-writable directory.

1%
Низкий
больше 3 лет назад
github логотип
GHSA-7w2r-8gq9-28xx

When receiving a URL through a SEND intent, Firefox would have searched for the text, but subsequent usages of the address bar might have caused the URL to load unintentionally, which could lead to XSS and spoofing attacks. *This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 95.

0%
Низкий
около 4 лет назад
github логотип
GHSA-7w2r-5rh4-3w9j

Mozilla Firefox before 37.0 on OS X does not ensure that the cursor is visible, which allows remote attackers to conduct clickjacking attacks via a Flash object in conjunction with DIV elements associated with layered presentation, and crafted JavaScript code that interacts with an IMG element.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-7vm3-8xjm-5j9p

In non-standard configurations, a JPEG image created by JavaScript could have caused an internal variable to overflow, resulting in an out of bounds write, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox < 78.

CVSS3: 8.8
1%
Низкий
больше 3 лет назад
github логотип
GHSA-7vcp-35cw-vjp4

An attacker who could have convinced a user to drag and drop an image to a filesystem could have manipulated the resulting filename to contain an executable extension, and by extension potentially tricked the user into executing malicious code. While very similar, this is a separate issue from CVE-2022-34483. This vulnerability affects Firefox < 102.

CVSS3: 8.8
0%
Низкий
около 3 лет назад
github логотип
GHSA-7v9j-67p6-63jv

Mozilla Firefox 3.x before 3.0.5 allows remote attackers to bypass intended privacy restrictions by using the persist attribute in an XUL element to create and access data entities that are similar to cookies.

1%
Низкий
больше 3 лет назад
github логотип
GHSA-7rph-qq97-wqp5

Due to insufficient escaping of the newline character in the “Copy as cURL” feature, an attacker could trick a user into using this command, potentially leading to local code execution on the user's system. This vulnerability affects Firefox < 139, Firefox ESR < 115.24, and Firefox ESR < 128.11.

CVSS3: 4.8
0%
Низкий
9 месяцев назад
github логотип
GHSA-7r2j-86vj-vwvm

Memory safety bugs were reported in Firefox 56. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 57.

CVSS3: 9.8
2%
Низкий
больше 3 лет назад

Уязвимостей на страницу