Page 43 of 2525 results (0.018 seconds)

CVSS: 8.8EPSS: 0%CPEs: 3EXPL: 0

03 Jun 2021 — Mozilla developers reported memory safety bugs present in Firefox 88 and Firefox ESR 78.11. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 78.11, Firefox < 89, and Firefox ESR < 78.11. Los desarrolladores de Mozilla han reportado bugs de seguridad de memoria presentes en Firefox versión 88 y Firefox ESR versión 78.11. Algunos de estos bugs mostraban evidenci... • https://bugzilla.mozilla.org/buglist.cgi?bug_id=1602862%2C1703191%2C1703760%2C1704722%2C1706041 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') CWE-787: Out-of-bounds Write •

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 0

02 Jun 2021 — Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 3.6.24 and 4.x through 7 allows remote attackers to inject arbitrary web script or HTML via vectors involving HTTP 0.9 errors, non-default ports, and content-sniffing. Una vulnerabilidad de tipo Cross-site scripting (XSS) en Mozilla Firefox versiones anteriores a 3.6.24 y versión 4.x hasta 7, permite a atacantes remotos inyectar script web o HTML arbitrario por medio de vectores que implican errores HTTP 0.9, puertos no predeterminados y la ... • https://bugzilla.mozilla.org/show_bug.cgi?id=667907 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.5EPSS: 0%CPEs: 4EXPL: 1

11 May 2021 — The Mozilla Maintenance Service granted SERVICE_START access to BUILTIN|Users which, in a domain network, grants normal remote users access to start or stop the service. This could be used to prevent the browser update service from operating (if an attacker spammed the 'Stop' command); but also exposed attack surface in the maintenance service. *Note: This issue only affected Windows operating systems older than Win 10 build 1709. Other operating systems are unaffected.*. This vulnerability affects Thunderb... • https://packetstorm.news/files/id/162522 • CWE-269: Improper Privilege Management •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

11 May 2021 — When Web Render components were destructed, a race condition could have caused undefined behavior, and we presume that with enough effort may have been exploitable to run arbitrary code. This vulnerability affects Firefox < 88.0.1 and Firefox for Android < 88.1.3. Cuando se destruían los componentes de Web Render, una condición de carrera podría haber causado un comportamiento indefinido, y presumimos que con suficiente esfuerzo podría haber sido explotable para ejecutar código arbitrario. Esta vulnerabilid... • https://bugzilla.mozilla.org/show_bug.cgi?id=1704227 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

27 Apr 2021 — Due to unexpected data type conversions, a use-after-free could have occurred when interacting with the font cache. We presume that with enough effort this could have been exploited to run arbitrary code. This vulnerability affects Firefox < 88. Debido a conversiones inesperadas de tipos de datos, podría haberse producido un uso de memoria previamente liberada al interactuar con la caché de fuentes. Presumimos que con suficiente esfuerzo esto podría haber sido explotado para ejecutar código arbitrario. • https://bugzilla.mozilla.org/show_bug.cgi?id=1701942 • CWE-681: Incorrect Conversion between Numeric Types •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

27 Apr 2021 — By utilizing 3D CSS in conjunction with Javascript, content could have been rendered outside the webpage's viewport, resulting in a spoofing attack that could have been used for phishing or other attacks on a user. This vulnerability affects Firefox < 88. Al utilizar CSS 3D en conjunción con Javascript, el contenido podría haber sido renderizado fuera de la ventana gráfica de la página web, dando lugar a un ataque de suplantación de identidad que podría haber sido utilizado para el phishing u otros ataques ... • https://bugzilla.mozilla.org/show_bug.cgi?id=1701834 •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

27 Apr 2021 — A compromised content process could have performed session history manipulations it should not have been able to due to testing infrastructure that was not restricted to testing-only configurations. This vulnerability affects Firefox < 88. Un proceso de contenido comprometido podría haber llevado a cabo manipulaciones del historial de sesiones que no debería haber podido debido a la infraestructura de pruebas que no estaba restringida a las configuraciones de solo prueba. Esta vulnerabilidad afecta a Firefo... • https://bugzilla.mozilla.org/show_bug.cgi?id=1694727 • CWE-668: Exposure of Resource to Wrong Sphere •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

27 Apr 2021 — Mozilla developers and community members reported memory safety bugs present in Firefox 87. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 88. Unos desarrolladores y miembros de la comunidad de Mozilla han reportado bugs de seguridad de memoria presentes en Firefox versión 87. Algunos de estos bugs mostraban evidencias de corrupción de memoria y presumimos que c... • https://bugzilla.mozilla.org/buglist.cgi?bug_id=1651449%2C1674142%2C1693476%2C1696886%2C1700091 • CWE-787: Out-of-bounds Write •

CVSS: 3.1EPSS: 0%CPEs: 1EXPL: 0

27 Apr 2021 — A race condition with requestPointerLock() and setTimeout() could have resulted in a user interacting with one tab when they believed they were on a separate tab. In conjunction with certain elements (such as <input type="file">) this could have led to an attack where a user was confused about the origin of the webpage and potentially disclosed information they did not intend to. This vulnerability affects Firefox < 88. Una condición de carrera con las funciones requestPointerLock() y setTimeout() pod... • https://bugzilla.mozilla.org/show_bug.cgi?id=1694698 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 8.8EPSS: 0%CPEs: 3EXPL: 0

26 Apr 2021 — When Responsive Design Mode was enabled, it used references to objects that were previously freed. We presume that with enough effort this could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 78.10, Thunderbird < 78.10, and Firefox < 88. Cuando se habilitó el Modo de Diseño Responsivo, se usaron referencias a objetos que fueron liberados previamente. Presumimos que con suficiente esfuerzo esto podría haber sido explotado para ejecutar código arbitrario. • https://bugzilla.mozilla.org/show_bug.cgi?id=1699835 • CWE-416: Use After Free CWE-672: Operation on a Resource after Expiration or Release •