Page 94 of 1804 results (0.006 seconds)

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

When a malicious application installed on the user's device broadcast an Intent to Firefox for Android, arbitrary headers could have been specified, leading to attacks such as abusing ambient authority or session fixation. This was resolved by only allowing certain safe-listed headers. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 84. • https://bugzilla.mozilla.org/show_bug.cgi?id=1661071 https://www.mozilla.org/security/advisories/mfsa2020-54 •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

By attempting to connect a website using an unresponsive port, an attacker could have controlled the content of a tab while the URL bar displayed the original domain. *Note: This issue only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 84. Al intentar conectar un sitio web usando un puerto que no responde, un atacante podría haber controlado el contenido de una pestaña mientras la barra de URL mostraba el dominio original. • https://bugzilla.mozilla.org/show_bug.cgi?id=1676311 https://www.mozilla.org/security/advisories/mfsa2020-54 •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

When a user typed a URL in the address bar or the search bar and quickly hit the enter key, a website could sometimes capture that event and then redirect the user before navigation occurred to the desired, entered address. To construct a convincing spoof the attacker would have had to guess what the user was typing, perhaps by suggesting it. This vulnerability affects Firefox < 84. Cuando un usuario escribió una URL en la barra de direcciones o en la barra de búsqueda y presionó rápidamente la tecla Intro, un sitio web a veces podía capturar ese evento y luego redireccionar al usuario antes de que la navegación ocurriera hacia la dirección ingresada deseada.&#xa0;Para construir una copia convincente, el atacante habría tenido que adivinar lo que estaba escribiendo el usuario, quizás sugiriéndolo. • https://bugzilla.mozilla.org/buglist.cgi?bug_id=1641287%2C1673299 https://www.mozilla.org/security/advisories/mfsa2020-54 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVSS: 8.8EPSS: 0%CPEs: 4EXPL: 0

If a user downloaded a file lacking an extension on Windows, and then "Open"-ed it from the downloads panel, if there was an executable file in the downloads directory with the same name but with an executable extension (such as .bat or .exe) that executable would have been launched instead. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox < 84, Thunderbird < 78.6, and Firefox ESR < 78.6. Si un usuario descargó un archivo que carece de una extensión en Windows y luego "Open"-ed desde el panel de descargas, si había un archivo ejecutable en el directorio de descargas con el mismo nombre pero con una extensión ejecutable (como .bat o .exe) ese ejecutable habría sido iniciado en su lugar. • https://bugzilla.mozilla.org/show_bug.cgi?id=1661365 https://www.mozilla.org/security/advisories/mfsa2020-54 https://www.mozilla.org/security/advisories/mfsa2020-55 https://www.mozilla.org/security/advisories/mfsa2020-56 •

CVSS: 8.8EPSS: 0%CPEs: 3EXPL: 0

Certain input to the CSS Sanitizer confused it, resulting in incorrect components being removed. This could have been used as a sanitizer bypass. This vulnerability affects Firefox < 84, Thunderbird < 78.6, and Firefox ESR < 78.6. Determinadas entradas hacia el CSS Sanitizer lo confundieron, resultando en una eliminación de componentes incorrectos.&#xa0;Esto podría haber sido usado como una omisión de saneo. • https://bugzilla.mozilla.org/show_bug.cgi?id=1680084 https://www.mozilla.org/security/advisories/mfsa2020-54 https://www.mozilla.org/security/advisories/mfsa2020-55 https://www.mozilla.org/security/advisories/mfsa2020-56 https://access.redhat.com/security/cve/CVE-2020-26973 https://bugzilla.redhat.com/show_bug.cgi?id=1908023 • CWE-20: Improper Input Validation •