
CVE-2017-5419 – Ubuntu Security Notice USN-3216-1
https://notcve.org/view.php?id=CVE-2017-5419
08 Mar 2017 — If a malicious site repeatedly triggers a modal authentication prompt, eventually the browser UI will become non-responsive, requiring shutdown through the operating system. This is a denial of service (DOS) attack. This vulnerability affects Firefox < 52 and Thunderbird < 52. Si un sitio web malicioso desencadena repetidamente un mensaje de autenticación modal, la interfaz de usuario del navegador dejará de responder y será necesario cerrarlo a través del sistema operativo. Esto es un ataque de denegación ... • http://www.securityfocus.com/bid/96692 •

CVE-2017-5420 – Ubuntu Security Notice USN-3216-1
https://notcve.org/view.php?id=CVE-2017-5420
08 Mar 2017 — A "javascript:" url loaded by a malicious page can obfuscate its location by blanking the URL displayed in the addressbar, allowing for an attacker to spoof an existing page without the malicious page's address being displayed correctly. This vulnerability affects Firefox < 52. Una URL "javascript:" cargada por una página maliciosa puede ofuscar su ubicación dejando en blanco la URL mostrada en la barra de direcciones, lo que permite que un atacante suplante una página existente sin que la dirección malicio... • http://www.securityfocus.com/bid/96692 • CWE-20: Improper Input Validation •

CVE-2017-5421 – Ubuntu Security Notice USN-3216-1
https://notcve.org/view.php?id=CVE-2017-5421
08 Mar 2017 — A malicious site could spoof the contents of the print preview window if popup windows are enabled, resulting in user confusion of what site is currently loaded. This vulnerability affects Firefox < 52 and Thunderbird < 52. Un sitio malicioso podría suplantar el contenido de la ventana de previsualización de impresión si las ventanas emergentes están habilitadas, lo que resulta en una confusión del usuario de qué sitio está cargado actualmente. La vulnerabilidad afecta a Firefox en versiones anteriores a la... • http://www.securityfocus.com/bid/96692 • CWE-20: Improper Input Validation •

CVE-2017-5422 – Ubuntu Security Notice USN-3216-1
https://notcve.org/view.php?id=CVE-2017-5422
08 Mar 2017 — If a malicious site uses the "view-source:" protocol in a series within a single hyperlink, it can trigger a non-exploitable browser crash when the hyperlink is selected. This was fixed by no longer making "view-source:" linkable. This vulnerability affects Firefox < 52 and Thunderbird < 52. Si un sitio malicioso emplea el protocolo "view-source:" en una serie en un único hipervínculo, puede desencadenar un cierre inesperado no explotable del navegador cuando se selecciona el hipervínculo. Esto se solucionó... • http://www.securityfocus.com/bid/96692 • CWE-20: Improper Input Validation •

CVE-2017-5426 – Ubuntu Security Notice USN-3216-1
https://notcve.org/view.php?id=CVE-2017-5426
08 Mar 2017 — On Linux, if the secure computing mode BPF (seccomp-bpf) filter is running when the Gecko Media Plugin sandbox is started, the sandbox fails to be applied and items that would run within the sandbox are run protected only by the running filter which is typically weak compared to the sandbox. Note: this issue only affects Linux. Other operating systems are not affected. This vulnerability affects Firefox < 52 and Thunderbird < 52. En Linux, si el filtro BPF en modo secure computing (seccomp-bpf) se está ejec... • http://www.securityfocus.com/bid/96694 • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVE-2017-5427 – Ubuntu Security Notice USN-3216-1
https://notcve.org/view.php?id=CVE-2017-5427
08 Mar 2017 — A non-existent chrome.manifest file will attempt to be loaded during startup from the primary installation directory. If a malicious user with local access puts chrome.manifest and other referenced files in this directory, they will be loaded and activated during startup. This could result in malicious software being added without consent or modification of referenced installed files. This vulnerability affects Firefox < 52. Un archivo chrome.manifest inexistente intentará cargarse durante el arranque desde... • http://www.securityfocus.com/bid/96692 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVE-2017-5384 – Ubuntu Security Notice USN-3175-1
https://notcve.org/view.php?id=CVE-2017-5384
30 Jan 2017 — Proxy Auto-Config (PAC) files can specify a JavaScript function called for all URL requests with the full URL path which exposes more information than would be sent to the proxy itself in the case of HTTPS. Normally the Proxy Auto-Config file is specified by the user or machine owner and presumed to be non-malicious, but if a user has enabled Web Proxy Auto Detect (WPAD) this file can be served remotely. This vulnerability affects Firefox < 51. Los archivos PAC (Proxy Auto-Config) pueden especificar una fun... • http://www.securityfocus.com/bid/95763 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2017-5385 – Ubuntu Security Notice USN-3175-1
https://notcve.org/view.php?id=CVE-2017-5385
30 Jan 2017 — Data sent with in multipart channels, such as the multipart/x-mixed-replace MIME type, will ignore the referrer-policy response header, leading to potential information disclosure for sites using this header. This vulnerability affects Firefox < 51. Los datos enviados en canales multiparte, como el tipo MIME multipart/x-mixed-replace, ignorarán la cabecera de respuesta Referrer-Policy, lo que conduce a una potencial divulgación de información en los sitios que emplean esta cabecera. La vulnerabilidad afecta... • http://www.securityfocus.com/bid/95763 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2017-5387 – Ubuntu Security Notice USN-3175-1
https://notcve.org/view.php?id=CVE-2017-5387
30 Jan 2017 — The existence of a specifically requested local file can be found due to the double firing of the "onerror" when the "source" attribute on a "

CVE-2017-5388 – Ubuntu Security Notice USN-3175-1
https://notcve.org/view.php?id=CVE-2017-5388
30 Jan 2017 — A STUN server in conjunction with a large number of "webkitRTCPeerConnection" objects can be used to send large STUN packets in a short period of time due to a lack of rate limiting being applied on e10s systems, allowing for a denial of service attack. This vulnerability affects Firefox < 51. Un servidor STUN, junto con un gran número de objetos "webkitRTCPeerConnection", puede emplearse para enviar paquetes STUN grandes en un corto período de tiempo debido a la falta de limitación de tasa aplicada en los ... • http://www.securityfocus.com/bid/95763 • CWE-770: Allocation of Resources Without Limits or Throttling •