Page 82 of 2230 results (0.036 seconds)

CVSS: 8.8EPSS: 0%CPEs: 3EXPL: 1

A malicious webpage could have triggered a use-after-free, memory corruption, and a potentially exploitable crash. *This bug could only be triggered when accessibility was enabled.*. This vulnerability affects Thunderbird < 78.12, Firefox ESR < 78.12, and Firefox < 90. Una página web maliciosa podría desencadenar un uso de memoria previamente liberada, una corrupción de memoria y un bloqueo potencialmente explotable. *Este bug sólo podía ser desencadenado cuando la accesibilidad estaba activada. • https://bugzilla.mozilla.org/show_bug.cgi?id=1709976 https://security.gentoo.org/glsa/202202-03 https://security.gentoo.org/glsa/202208-14 https://www.mozilla.org/security/advisories/mfsa2021-28 https://www.mozilla.org/security/advisories/mfsa2021-29 https://www.mozilla.org/security/advisories/mfsa2021-30 https://access.redhat.com/security/cve/CVE-2021-29970 https://bugzilla.redhat.com/show_bug.cgi?id=1982013 • CWE-416: Use After Free CWE-787: Out-of-bounds Write •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

Lack of escaping allowed HTML injection when a webpage was viewed in Reader View. While a Content Security Policy prevents direct code execution, HTML injection is still possible. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 88. • https://bugzilla.mozilla.org/show_bug.cgi?id=1697604 https://www.mozilla.org/security/advisories/mfsa2021-16 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 0

A malicious webpage could have forced a Firefox for Android user into executing attacker-controlled JavaScript in the context of another domain, resulting in a Universal Cross-Site Scripting vulnerability. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected. Further details are being temporarily withheld to allow users an opportunity to update.*. This vulnerability affects Firefox < 88.0.1 and Firefox for Android < 88.1.3. • https://bugzilla.mozilla.org/show_bug.cgi?id=1701684 https://www.mozilla.org/security/advisories/mfsa2021-20 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.3EPSS: 0%CPEs: 2EXPL: 0

A transient execution vulnerability, named Floating Point Value Injection (FPVI) allowed an attacker to leak arbitrary memory addresses and may have also enabled JIT type confusion attacks. (A related vulnerability, Speculative Code Store Bypass (SCSB), did not affect Firefox.). This vulnerability affects Firefox ESR < 78.9 and Firefox < 87. Una vulnerabilidad de ejecución transitoria, denominada Floating Point Value Injection (FPVI) permitía a un atacante filtrar direcciones de memoria arbitrarias y también podría haber permitido ataques de confusión de tipo JIT. (Una vulnerabilidad relacionada, Speculative Code Store Bypass (SCSB), no afecta a Firefox). • https://bugzilla.mozilla.org/show_bug.cgi?id=1692972 https://www.mozilla.org/security/advisories/mfsa2021-10 https://www.mozilla.org/security/advisories/mfsa2021-11 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

When a download was initiated, the client did not check whether it was in normal or private browsing mode, which led to private mode cookies being shared in normal browsing mode. This vulnerability affects Firefox for iOS < 34. Cuando se iniciaba una descarga, el cliente no comprobaba si estaba en modo de navegación normal o privado, lo que conllevaba a que las cookies del modo privado se compartieran en el modo de navegación normal. Esta vulnerabilidad afecta a Firefox para iOS versiones anteriores a 34 • https://bugzilla.mozilla.org/show_bug.cgi?id=1670127 https://www.mozilla.org/security/advisories/mfsa2021-25 • CWE-862: Missing Authorization •