Page 182 of 2096 results (0.011 seconds)

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

A "data:" URL loaded in a new tab did not inherit the Content Security Policy (CSP) of the original page, allowing for bypasses of the policy including the execution of JavaScript. In prior versions when "data:" documents also inherited the context of the original page this would allow for potential cross-site scripting (XSS) attacks. This vulnerability affects Firefox < 57. Una URL "data:" cargada en una nueva pestaña no hereda la política de seguridad de contenido (CSP) de la página original, permitiendo la omisión de la política, incluyendo la ejecución de código JavaScript. Las versiones anteriores, cuando los documentos "data:" también heredaban el contexto de la página original, permitirían ataques Cross-Site Scripting (XSS) potenciales. • http://www.securityfocus.com/bid/101832 http://www.securitytracker.com/id/1039803 https://bugzilla.mozilla.org/show_bug.cgi?id=1358009 https://www.mozilla.org/security/advisories/mfsa2017-24 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

JavaScript can be injected into an exported bookmarks file by placing JavaScript code into user-supplied tags in saved bookmarks. If the resulting exported HTML file is later opened in a browser this JavaScript will be executed. This could be used in social engineering and self-cross-site-scripting (self-XSS) attacks if users were convinced to add malicious tags to bookmarks, export them, and then open the resulting file. This vulnerability affects Firefox < 57. Se puede inyectar código JavaScript en un archivo de marcadores exportado colocando código JavaScript en las etiquetas proporcionadas por el usuario en los marcadores guardados. • http://www.securityfocus.com/bid/101832 http://www.securitytracker.com/id/1039803 https://bugzilla.mozilla.org/show_bug.cgi?id=1366420 https://www.mozilla.org/security/advisories/mfsa2017-24 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

Memory safety bugs were reported in Firefox 56. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 57. Se han informado de errores de seguridad de memoria en Firefox 56. Algunos de estos errores mostraron evidencias de corrupción de memoria y se cree que, con el esfuerzo necesario, se podrían explotar para ejecutar código arbitrario. • http://www.securityfocus.com/bid/101832 http://www.securitytracker.com/id/1039803 https://bugzilla.mozilla.org/buglist.cgi?bug_id=1399922%2C1403646%2C1403716%2C1365894%2C1402876%2C1406154%2C1384121%2C1384615%2C1407375%2C1339485%2C1361432%2C1394031%2C1383019%2C1407032%2C1387845%2C1386490 https://www.mozilla.org/security/advisories/mfsa2017-24 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

SVG loaded through "<img>" tags can use "<meta>" tags within the SVG data to set cookies for that page. This vulnerability affects Firefox < 57. SVG cargado mediante etiquetas "" pueden utilizar etiquetas "" en los datos SVG para configurar cookies para esta página. Esta vulnerabilidad afecta a las versiones anteriores a la 57 de Firefox. • http://www.securityfocus.com/bid/101832 http://www.securitytracker.com/id/1039803 https://bugzilla.mozilla.org/show_bug.cgi?id=1325923 https://www.mozilla.org/security/advisories/mfsa2017-24 • CWE-20: Improper Input Validation •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

If a document's Referrer Policy attribute is set to "no-referrer" sometimes two network requests are made for "<link>" elements instead of one. One of these requests includes the referrer instead of respecting the set policy to not include a referrer on requests. This vulnerability affects Firefox < 57. Si el atributo Referrer Policy de un documento se establece en "no-referrer", a veces se hacen dos peticiones de red para elementos "" en lugar de una. Una de estas peticiones incluye al referrer en lugar de respetar la política establecida de no incluir un referrer en las peticiones. • http://www.securityfocus.com/bid/101832 http://www.securitytracker.com/id/1039803 https://bugzilla.mozilla.org/show_bug.cgi?id=1397064 https://www.mozilla.org/security/advisories/mfsa2017-24 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •