Page 129 of 2526 results (0.005 seconds)

CVSS: 8.8EPSS: 0%CPEs: 3EXPL: 0

Logging-related command line parameters are not properly sanitized when Firefox is launched by another program, such as when a user clicks on malicious links in a chat application. This can be used to write a log file to an arbitrary location such as the Windows 'Startup' folder. <br>*Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox < 69 and Firefox ESR < 68.1. Los parámetros de línea de comando relacionados con el Inicio de Sesión no son saneados apropiadamente cuando Firefox es iniciado por otro programa, tal y como cuando un usuario hace clic en enlaces maliciosos en una aplicación de chat. • http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html https://bugzilla.mozilla.org/show_bug.cgi?id=1572838 https://www.mozilla.org/security/advisories/mfsa2019-25 https://www.mozilla.org/security/advisories/mfsa2019-26 • CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

The Firefox installer allows Firefox to be installed to a custom user writable location, leaving it unprotected from manipulation by unprivileged users or malware. If the Mozilla Maintenance Service is manipulated to update this unprotected location and the updated maintenance service in the unprotected location has been altered, the altered maintenance service can run with elevated privileges during the update process due to a lack of integrity checks. This allows for privilege escalation if the executable has been replaced locally. <br>*Note: This attack requires local system access and only affects Windows. Other operating systems are not affected.*. • http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html https://bugzilla.mozilla.org/show_bug.cgi?id=1574980 https://www.mozilla.org/security/advisories/mfsa2019-25 https://www.mozilla.org/security/advisories/mfsa2019-26 https://www.mozilla.org/security/advisories/mfsa2019-27 • CWE-354: Improper Validation of Integrity Check Value •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

When the pointer lock is enabled by a website though requestPointerLock(), no user notification is given. This could allow a malicious website to hijack the mouse pointer and confuse users. This vulnerability affects Firefox < 69.0.1. Cuando el bloqueo del puntero es habilitado por un sitio web por medio de la función requestPointerLock(), no se entrega ninguna notificación al usuario. Esto podría permitir que un sitio web malicioso secuestrara el puntero del mouse y confundiera a los usuarios. • https://bugzilla.mozilla.org/show_bug.cgi?id=1580506 https://www.mozilla.org/security/advisories/mfsa2019-31 •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

A compromised sandboxed content process can perform a Universal Cross-site Scripting (UXSS) attack on content from any site it can cause to be loaded in the same process. Because addons.mozilla.org and accounts.firefox.com have close ties to the Firefox product, malicious manipulation of these sites within the browser can potentially be used to modify a user's Firefox configuration. These two sites will now be isolated into their own process and not allowed to be loaded in a standard content process. This vulnerability affects Firefox < 69. Un proceso contenido en un sandbox comprometido puede realizar un ataque Universal Cross-site Scripting (UXSS) sobre el contenido de cualquier sitio que pueda causar que sea cargado en el mismo proceso. • https://bugzilla.mozilla.org/show_bug.cgi?id=1539595 https://www.mozilla.org/security/advisories/mfsa2019-25 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

If a wildcard ('*') is specified for the host in Content Security Policy (CSP) directives, any port or path restriction of the directive will be ignored, leading to CSP directives not being properly applied to content. This vulnerability affects Firefox < 69. Si es especificado un comodín ('*') para el host en las directivas de Content Security Policy (CSP), será ignorada cualquier restricción de puerto o ruta de la directiva, lo que provocará que las directivas CSP no se apliquen correctamente al contenido. Esta vulnerabilidad afecta a Firefox versiones anteriores a 69. • https://bugzilla.mozilla.org/show_bug.cgi?id=1388015 https://www.mozilla.org/security/advisories/mfsa2019-25 • CWE-345: Insufficient Verification of Data Authenticity •