Логотип exploitDog
product: "firefox"
Консоль
Логотип exploitDog

exploitDog

product: "firefox"

Количество 15 501

Количество 15 501

github логотип

GHSA-7qq3-vgfq-7f3m

больше 3 лет назад

A Content Provider in Firefox for Android allowed local files accessible by the browser to be read by a remote webpage, leading to sensitive data disclosure, including cookies for other origins. This vulnerability affects Firefox for < Android.

EPSS: Низкий
github логотип

GHSA-7qjx-chpf-r2c4

больше 3 лет назад

Race condition in the nsThreadManager::RegisterCurrentThread function in Mozilla Firefox before 38.0 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and heap memory corruption) by leveraging improper Media Decoder Thread creation at the time of a shutdown.

EPSS: Низкий
github логотип

GHSA-7qcf-mj94-5gw6

больше 3 лет назад

Some special resource URIs will cause a non-exploitable crash if loaded with optional parameters following a '?' in the parsed string. This could lead to denial of service (DOS) attacks. This vulnerability affects Firefox < 63.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-7p9f-x9pw-w3x4

около 2 месяцев назад

Use-after-free in the Disability Access APIs component. This vulnerability affects Firefox < 146.0.1.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-7mvx-m8hq-f37g

около 3 лет назад

While the text displayed in Autofill tooltips cannot be directly read by JavaScript, the text was rendered using page fonts. Side-channel attacks on the text by using specially crafted fonts could have lead to this text being inferred by the webpage. This vulnerability affects Firefox < 98.

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-7mpv-6jjp-xm5c

около 2 лет назад

When an https: web page created a pop-up from a "javascript:" URL, that pop-up was incorrectly allowed to load blockable content such as iframes from insecure http: URLs This vulnerability affects Firefox < 120.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-7mjf-v629-m8hm

больше 2 лет назад

An attacker with temporary script access to a site could have set a cookie containing invalid characters using `document.cookie` that could have led to unknown errors. This vulnerability affects Firefox < 119.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-7mgv-jg63-hvqh

почти 4 года назад

Mozilla Firefox 3.0.x, 3.5, and 3.5.1 on Windows allows remote attackers to cause a denial of service (uncaught exception and application crash) via a long Unicode string argument to the write method. NOTE: this was originally reported as a stack-based buffer overflow. NOTE: on Linux and Mac OS X, a crash resulting from this long string reportedly occurs in an operating-system library, not in Firefox.

EPSS: Средний
github логотип

GHSA-7mfw-wgr7-m3jg

9 месяцев назад

Opening maliciously-crafted URLs in Firefox from other apps such as Safari could have allowed attackers to spoof website addresses if the URLs utilized non-HTTP schemes used internally by the Firefox iOS client This vulnerability affects Firefox for iOS < 139.

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-7m2r-r8f2-p7vc

почти 4 года назад

Mozilla Firefox 2.0 before 2.0.0.8 allows remote attackers to obtain sensitive system information by using the addMicrosummaryGenerator sidebar method to access file: URIs.

EPSS: Низкий
github логотип

GHSA-7jg2-jgv3-fmr4

больше 3 лет назад

Malicious PDF can inject JavaScript into PDF Viewer

CVSS3: 8.8
EPSS: Средний
github логотип

GHSA-7jg2-5jh7-2mjr

почти 4 года назад

Mozilla Firefox 3.6.x before 3.6.3 does not properly manage the scopes of DOM nodes that are moved from one document to another, which allows remote attackers to conduct use-after-free attacks and execute arbitrary code via unspecified vectors involving improper interaction with garbage collection, as demonstrated by Nils during a Pwn2Own competition at CanSecWest 2010.

EPSS: Низкий
github логотип

GHSA-7j8v-jvv6-m8cg

больше 3 лет назад

After a website had entered fullscreen mode, it could have used a previously opened popup to obscure the notification that indicates the browser is in fullscreen mode. Combined with spoofing the browser chrome, this could have led to confusing the user about the current origin of the page and credential theft or other attacks. This vulnerability affects Firefox < 74.

EPSS: Низкий
github логотип

GHSA-7j2m-9286-4vwj

почти 4 года назад

Unspecified versions of Mozilla Firefox allow remote attackers to cause a denial of service (crash) via a web page that contains a large number of nested marquee tags. NOTE: a followup post indicated that the initial report could not be verified.

EPSS: Низкий
github логотип

GHSA-7hw4-x97q-5wx2

почти 2 года назад

Upon scanning a JavaScript URI with the QR code scanner, an attacker could have executed unauthorized scripts on the current top origin sites in the URL bar. This vulnerability affects Firefox for iOS < 123.

CVSS3: 4.7
EPSS: Низкий
github логотип

GHSA-7gph-q54q-7qm4

больше 3 лет назад

The nsAttrAndChildArray::GrowBy function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors, related to an "overflow."

EPSS: Низкий
github логотип

GHSA-7gm2-7q64-2c48

больше 3 лет назад

Mozilla Firefox before 42.0 on Android improperly restricts URL strings in intents, which allows attackers to conduct cross-site scripting (XSS) attacks via vectors involving an intent: URL and fallback navigation, aka "Universal XSS (UXSS)."

EPSS: Низкий
github логотип

GHSA-7g8x-jvgq-fx72

больше 3 лет назад

The WebGL implementation in Mozilla Firefox 4.x through 4.0.1 does not properly restrict write operations, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors.

EPSS: Низкий
github логотип

GHSA-7g8j-7wv5-6f7h

больше 3 лет назад

When entered directly, Reader Mode did not strip the username and password section of URLs displayed in the addressbar. This can be used for spoofing the domain of the current page. This vulnerability affects Firefox < 54.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-7f82-h9r4-w4qw

больше 3 лет назад

SVG loaded through "<img>" tags can use "<meta>" tags within the SVG data to set cookies for that page. This vulnerability affects Firefox < 57.

CVSS3: 5.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-7qq3-vgfq-7f3m

A Content Provider in Firefox for Android allowed local files accessible by the browser to be read by a remote webpage, leading to sensitive data disclosure, including cookies for other origins. This vulnerability affects Firefox for < Android.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-7qjx-chpf-r2c4

Race condition in the nsThreadManager::RegisterCurrentThread function in Mozilla Firefox before 38.0 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and heap memory corruption) by leveraging improper Media Decoder Thread creation at the time of a shutdown.

1%
Низкий
больше 3 лет назад
github логотип
GHSA-7qcf-mj94-5gw6

Some special resource URIs will cause a non-exploitable crash if loaded with optional parameters following a '?' in the parsed string. This could lead to denial of service (DOS) attacks. This vulnerability affects Firefox < 63.

CVSS3: 7.5
1%
Низкий
больше 3 лет назад
github логотип
GHSA-7p9f-x9pw-w3x4

Use-after-free in the Disability Access APIs component. This vulnerability affects Firefox < 146.0.1.

CVSS3: 9.8
0%
Низкий
около 2 месяцев назад
github логотип
GHSA-7mvx-m8hq-f37g

While the text displayed in Autofill tooltips cannot be directly read by JavaScript, the text was rendered using page fonts. Side-channel attacks on the text by using specially crafted fonts could have lead to this text being inferred by the webpage. This vulnerability affects Firefox < 98.

CVSS3: 4.3
0%
Низкий
около 3 лет назад
github логотип
GHSA-7mpv-6jjp-xm5c

When an https: web page created a pop-up from a "javascript:" URL, that pop-up was incorrectly allowed to load blockable content such as iframes from insecure http: URLs This vulnerability affects Firefox < 120.

CVSS3: 6.5
0%
Низкий
около 2 лет назад
github логотип
GHSA-7mjf-v629-m8hm

An attacker with temporary script access to a site could have set a cookie containing invalid characters using `document.cookie` that could have led to unknown errors. This vulnerability affects Firefox < 119.

CVSS3: 5.3
0%
Низкий
больше 2 лет назад
github логотип
GHSA-7mgv-jg63-hvqh

Mozilla Firefox 3.0.x, 3.5, and 3.5.1 on Windows allows remote attackers to cause a denial of service (uncaught exception and application crash) via a long Unicode string argument to the write method. NOTE: this was originally reported as a stack-based buffer overflow. NOTE: on Linux and Mac OS X, a crash resulting from this long string reportedly occurs in an operating-system library, not in Firefox.

11%
Средний
почти 4 года назад
github логотип
GHSA-7mfw-wgr7-m3jg

Opening maliciously-crafted URLs in Firefox from other apps such as Safari could have allowed attackers to spoof website addresses if the URLs utilized non-HTTP schemes used internally by the Firefox iOS client This vulnerability affects Firefox for iOS < 139.

CVSS3: 4.3
0%
Низкий
9 месяцев назад
github логотип
GHSA-7m2r-r8f2-p7vc

Mozilla Firefox 2.0 before 2.0.0.8 allows remote attackers to obtain sensitive system information by using the addMicrosummaryGenerator sidebar method to access file: URIs.

1%
Низкий
почти 4 года назад
github логотип
GHSA-7jg2-jgv3-fmr4

Malicious PDF can inject JavaScript into PDF Viewer

CVSS3: 8.8
41%
Средний
больше 3 лет назад
github логотип
GHSA-7jg2-5jh7-2mjr

Mozilla Firefox 3.6.x before 3.6.3 does not properly manage the scopes of DOM nodes that are moved from one document to another, which allows remote attackers to conduct use-after-free attacks and execute arbitrary code via unspecified vectors involving improper interaction with garbage collection, as demonstrated by Nils during a Pwn2Own competition at CanSecWest 2010.

6%
Низкий
почти 4 года назад
github логотип
GHSA-7j8v-jvv6-m8cg

After a website had entered fullscreen mode, it could have used a previously opened popup to obscure the notification that indicates the browser is in fullscreen mode. Combined with spoofing the browser chrome, this could have led to confusing the user about the current origin of the page and credential theft or other attacks. This vulnerability affects Firefox < 74.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-7j2m-9286-4vwj

Unspecified versions of Mozilla Firefox allow remote attackers to cause a denial of service (crash) via a web page that contains a large number of nested marquee tags. NOTE: a followup post indicated that the initial report could not be verified.

8%
Низкий
почти 4 года назад
github логотип
GHSA-7hw4-x97q-5wx2

Upon scanning a JavaScript URI with the QR code scanner, an attacker could have executed unauthorized scripts on the current top origin sites in the URL bar. This vulnerability affects Firefox for iOS < 123.

CVSS3: 4.7
0%
Низкий
почти 2 года назад
github логотип
GHSA-7gph-q54q-7qm4

The nsAttrAndChildArray::GrowBy function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors, related to an "overflow."

3%
Низкий
больше 3 лет назад
github логотип
GHSA-7gm2-7q64-2c48

Mozilla Firefox before 42.0 on Android improperly restricts URL strings in intents, which allows attackers to conduct cross-site scripting (XSS) attacks via vectors involving an intent: URL and fallback navigation, aka "Universal XSS (UXSS)."

1%
Низкий
больше 3 лет назад
github логотип
GHSA-7g8x-jvgq-fx72

The WebGL implementation in Mozilla Firefox 4.x through 4.0.1 does not properly restrict write operations, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors.

5%
Низкий
больше 3 лет назад
github логотип
GHSA-7g8j-7wv5-6f7h

When entered directly, Reader Mode did not strip the username and password section of URLs displayed in the addressbar. This can be used for spoofing the domain of the current page. This vulnerability affects Firefox < 54.

CVSS3: 7.5
1%
Низкий
больше 3 лет назад
github логотип
GHSA-7f82-h9r4-w4qw

SVG loaded through "<img>" tags can use "<meta>" tags within the SVG data to set cookies for that page. This vulnerability affects Firefox < 57.

CVSS3: 5.3
1%
Низкий
больше 3 лет назад

Уязвимостей на страницу