Mozilla

Firefox

2867 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.07%
  • Published 25.03.2020 22:15:12
  • Last modified 21.11.2024 05:36:13

When a device was changed while a stream was about to be destroyed, the <code>stream-reinit</code> task may have been executed after the stream was destroyed, causing a use-after-free and a potentially exploitable crash. This vulnerability affects Th...

  • EPSS 0.27%
  • Published 25.03.2020 22:15:12
  • Last modified 21.11.2024 05:36:13

When a JavaScript URL (javascript:) is evaluated and the result is a string, this string is parsed to create an HTML document, which is then presented. Previously, this document's URL (as reported by the document.location property, for example) was t...

  • EPSS 0.35%
  • Published 25.03.2020 22:15:12
  • Last modified 21.11.2024 05:36:13

When a Web Extension had the all-urls permission and made a fetch request with a mode set to 'same-origin', it was possible for the Web Extension to read local files. This vulnerability affects Firefox < 74.

  • EPSS 0.2%
  • Published 25.03.2020 22:15:12
  • Last modified 21.11.2024 05:36:13

After a website had entered fullscreen mode, it could have used a previously opened popup to obscure the notification that indicates the browser is in fullscreen mode. Combined with spoofing the browser chrome, this could have led to confusing the us...

Exploit
  • EPSS 1.36%
  • Published 25.03.2020 22:15:12
  • Last modified 21.11.2024 05:36:13

The 'Copy as cURL' feature of Devtools' network tab did not properly escape the HTTP method of a request, which can be controlled by the website. If a user used the 'Copy as Curl' feature and pasted the command into a terminal, it could have resulted...

  • EPSS 0.58%
  • Published 25.03.2020 22:15:12
  • Last modified 21.11.2024 05:36:13

The first time AirPods are connected to an iPhone, they become named after the user's name by default (e.g. Jane Doe's AirPods.) Websites with camera or microphone permission are able to enumerate device names, disclosing the user's name. To resolve ...

  • EPSS 0.13%
  • Published 25.03.2020 22:15:12
  • Last modified 21.11.2024 05:36:13

When protecting CSS blocks with the nonce feature of Content Security Policy, the @import statement in the CSS block could allow an attacker to inject arbitrary styles, bypassing the intent of the Content Security Policy. This vulnerability affects F...

  • EPSS 0.87%
  • Published 02.03.2020 05:15:13
  • Last modified 21.11.2024 05:36:11

A content process could have modified shared memory relating to crash reporting information, crash itself, and cause an out-of-bound write. This could have caused memory corruption and a potentially exploitable crash. This vulnerability affects Firef...

  • EPSS 1.02%
  • Published 02.03.2020 05:15:13
  • Last modified 21.11.2024 05:36:12

By downloading a file with the .fileloc extension, a semi-privileged extension could launch an arbitrary application on the user's computer. The attacker is restricted as they are unable to download non-quarantined files or supply command line argume...

  • EPSS 1.27%
  • Published 02.03.2020 05:15:13
  • Last modified 21.11.2024 05:36:12

If a template tag was used in a select tag, the parser could be confused and allow JavaScript parsing and execution when it should not be allowed. A site that relied on the browser behaving correctly could suffer a cross-site scripting vulnerability ...