Page 128 of 2107 results (0.011 seconds)

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

When the pointer lock is enabled by a website though requestPointerLock(), no user notification is given. This could allow a malicious website to hijack the mouse pointer and confuse users. This vulnerability affects Firefox < 69.0.1. Cuando el bloqueo del puntero es habilitado por un sitio web por medio de la función requestPointerLock(), no se entrega ninguna notificación al usuario. Esto podría permitir que un sitio web malicioso secuestrara el puntero del mouse y confundiera a los usuarios. • https://bugzilla.mozilla.org/show_bug.cgi?id=1580506 https://www.mozilla.org/security/advisories/mfsa2019-31 •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

A compromised sandboxed content process can perform a Universal Cross-site Scripting (UXSS) attack on content from any site it can cause to be loaded in the same process. Because addons.mozilla.org and accounts.firefox.com have close ties to the Firefox product, malicious manipulation of these sites within the browser can potentially be used to modify a user's Firefox configuration. These two sites will now be isolated into their own process and not allowed to be loaded in a standard content process. This vulnerability affects Firefox < 69. Un proceso contenido en un sandbox comprometido puede realizar un ataque Universal Cross-site Scripting (UXSS) sobre el contenido de cualquier sitio que pueda causar que sea cargado en el mismo proceso. • https://bugzilla.mozilla.org/show_bug.cgi?id=1539595 https://www.mozilla.org/security/advisories/mfsa2019-25 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

If a wildcard ('*') is specified for the host in Content Security Policy (CSP) directives, any port or path restriction of the directive will be ignored, leading to CSP directives not being properly applied to content. This vulnerability affects Firefox < 69. Si es especificado un comodín ('*') para el host en las directivas de Content Security Policy (CSP), será ignorada cualquier restricción de puerto o ruta de la directiva, lo que provocará que las directivas CSP no se apliquen correctamente al contenido. Esta vulnerabilidad afecta a Firefox versiones anteriores a 69. • https://bugzilla.mozilla.org/show_bug.cgi?id=1388015 https://www.mozilla.org/security/advisories/mfsa2019-25 • CWE-345: Insufficient Verification of Data Authenticity •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

Mozilla developers and community members reported memory safety bugs present in Firefox 68. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 69. Los desarrolladores de Mozilla y los miembros de la comunidad reportaron bugs de seguridad de la memoria presentes en Firefox versión 68. Algunos de estos errores mostraron evidencia de corrupción de la memoria y presumimos que con suficiente esfuerzo algunos de estos podrían ser explotados para ejecutar código arbitrario. • https://bugzilla.mozilla.org/buglist.cgi?bug_id=1352875%2C1536227%2C1557208%2C1560641 https://www.mozilla.org/security/advisories/mfsa2019-25 • CWE-787: Out-of-bounds Write •

CVSS: 6.1EPSS: 0%CPEs: 5EXPL: 0

Some HTML elements, such as &lt;title&gt; and &lt;textarea&gt;, can contain literal angle brackets without treating them as markup. It is possible to pass a literal closing tag to .innerHTML on these elements, and subsequent content after that will be parsed as if it were outside the tag. This can lead to XSS if a site does not filter user input as strictly for these elements as it does for other elements. This vulnerability affects Firefox < 69, Thunderbird < 68.1, Thunderbird < 60.9, Firefox ESR < 60.9, and Firefox ESR < 68.1. Algunos elementos HTML, tales como &lt;title&gt; y &lt;textarea&gt;, puede contener corchetes angulares literales sin tratarlos como un marcado. • http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html https://bugzilla.mozilla.org/show_bug.cgi?id=1562033 https://security.gentoo.org/glsa/201911-07 https://usn.ubuntu.com/4150-1 https://www.mozilla.org/security/advisories/mfsa2019-25 https://w • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •