Page 53 of 1065 results (0.019 seconds)

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

10 Aug 2020 — Firefox could be made to load attacker-supplied DLL files from the installation directory. This required an attacker that is already capable of placing files in the installation directory. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR < 78.1, Firefox < 79, and Thunderbird < 78.1. • http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html • CWE-427: Uncontrolled Search Path Element •

CVSS: 4.7EPSS: 0%CPEs: 2EXPL: 0

10 Aug 2020 — When converting coordinates from projective to affine, the modular inversion was not performed in constant time, resulting in a possible timing-based side channel attack. This vulnerability affects Firefox < 80 and Firefox for Android < 80. Cuando se convierten coordenadas desde una descriptiva a afín, la inversión modular no se llevó a cabo en un tiempo constante, resultando en un posible ataque de canal lateral basado en sincronización. Esta vulnerabilidad afecta a Firefox versiones anteriores a 80 y... • https://bugzilla.mozilla.org/show_bug.cgi?id=1623116 • CWE-203: Observable Discrepancy CWE-327: Use of a Broken or Risky Cryptographic Algorithm •

CVSS: 6.5EPSS: 0%CPEs: 7EXPL: 0

30 Jul 2020 — A redirected HTTP request which is observed or modified through a web extension could bypass existing CORS checks, leading to potential disclosure of cross-origin information. This vulnerability affects Firefox ESR < 78.1, Firefox < 79, and Thunderbird < 78.1. Una petición HTTP redireccionada que es observada o modificada por medio de una extensión web podría omitir las comprobaciones de CORS existentes, conllevando a una potencial divulgación de información de origen cruzado. Esta vulnerabilidad afecta a F... • http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html •

CVSS: 9.3EPSS: 0%CPEs: 7EXPL: 0

30 Jul 2020 — JIT optimizations involving the Javascript arguments object could confuse later optimizations. This risk was already mitigated by various precautions in the code, resulting in this bug rated at only moderate severity. This vulnerability affects Firefox ESR < 78.1, Firefox < 79, and Thunderbird < 78.1. Las optimizaciones JIT que involucran el objeto de argumentos de Javascript podrían confundir optimizaciones posteriores. Este riesgo ya fue mitigado por varias precauciones en el código, resultando en este er... • http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html • CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') •

CVSS: 6.5EPSS: 0%CPEs: 6EXPL: 0

30 Jul 2020 — When in an endless loop, a website specifying a custom cursor using CSS could make it look like the user is interacting with the user interface, when they are not. This could lead to a perceived broken state, especially when interactions with existing browser dialogs and warnings do not work. This vulnerability affects Firefox ESR < 78.1, Firefox < 79, and Thunderbird < 78.1. Cuando en un bucle infinito, un sitio web que especifica un cursor personalizado usando CSS podría hacer que parezca que el usuario e... • http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html • CWE-451: User Interface (UI) Misrepresentation of Critical Information CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •

CVSS: 6.5EPSS: 0%CPEs: 6EXPL: 0

30 Jul 2020 — An iframe sandbox element with the allow-popups flag could be bypassed when using noopener links. This could have led to security issues for websites relying on sandbox configurations that allowed popups and hosted arbitrary content. This vulnerability affects Firefox ESR < 78.1, Firefox < 79, and Thunderbird < 78.1. Un elemento del sandbox de iframe con el flag allow-popups podría ser omitida cuando se usan enlaces noopener. Esto podría haber conllevado a problemas de seguridad para los sitios web que depe... • http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html • CWE-276: Incorrect Default Permissions •

CVSS: 6.5EPSS: 0%CPEs: 8EXPL: 0

28 Jul 2020 — By observing the stack trace for JavaScript errors in web workers, it was possible to leak the result of a cross-origin redirect. This applied only to content that can be parsed as script. This vulnerability affects Firefox < 79, Firefox ESR < 68.11, Firefox ESR < 78.1, Thunderbird < 68.11, and Thunderbird < 78.1. Al observar el seguimiento de la pila de errores de JavaScript en los trabajadores web, fue posible filtrar el resultado de un redireccionamiento de origen cruzado. Esto se aplica solo al contenid... • http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00022.html • CWE-209: Generation of Error Message Containing Sensitive Information CWE-346: Origin Validation Error •

CVSS: 9.3EPSS: 1%CPEs: 10EXPL: 0

28 Jul 2020 — Mozilla developers and community members reported memory safety bugs present in Firefox 78 and Firefox ESR 78.0. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 79, Firefox ESR < 68.11, Firefox ESR < 78.1, Thunderbird < 68.11, and Thunderbird < 78.1. Los desarrolladores de Mozilla y los miembros de la comunidad informaron bugs de seguridad de la memoria presentes... • http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00022.html • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') CWE-787: Out-of-bounds Write •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

09 Jul 2020 — By navigating a tab using the history API, an attacker could cause the address bar to display the incorrect domain (with the https:// scheme, a blocked port number such as '1', and without a lock icon) while controlling the page contents. This vulnerability affects Firefox < 70. Al navegar en una pestaña usando la API history, un atacante podría causar que la barra de direcciones muestre el dominio incorrecto (con el esquema https://, un número de puerto bloqueado como "1" y sin un ícono de bloqueo) mientra... • https://bugzilla.mozilla.org/show_bug.cgi?id=1528587 •

CVSS: 9.3EPSS: 0%CPEs: 3EXPL: 1

09 Jul 2020 — A VideoStreamEncoder may have been freed in a race condition with VideoBroadcaster::AddOrUpdateSink, resulting in a use-after-free, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox < 78. Un VideoStreamEncoder puede haberse liberado en una condición de carrera con la función VideoBroadcaster::AddOrUpdateSink, resultando en un uso de la memoria previamente liberada, una corrupción de la memoria y un bloqueo potencialmente explotable. Esta vulnerabilidad afecta a Firef... • http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') CWE-416: Use After Free •