This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Mozilla First view 2003-12-31
Product Firefox Last view 2020-05-26
Version Type
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:* 1592
cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:* 1587
cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:* 1586
cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:* 1584
cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:* 1582
cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:* 1581
cpe:2.3:a:mozilla:firefox:0.9:rc:*:*:*:*:*:* 1579
cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:* 1574
cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:* 1574
cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:* 1568
cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:* 1566
cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:* 1562
cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:* 1558
cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:* 1555
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* 1546
cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:* 1545
cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:* 1545
cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:* 1543
cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:* 1541
cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:* 1536
cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:* 1534
cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:* 1532
cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:* 1529
cpe:2.3:a:mozilla:firefox:-:*:*:*:*:*:*:* 1524
cpe:2.3:a:mozilla:firefox:0.9_rc:*:*:*:*:*:*:* 1522
cpe:2.3:a:mozilla:firefox:0.6:*:*:*:*:*:*:* 1521
cpe:2.3:a:mozilla:firefox:0.6.1:*:*:*:*:*:*:* 1521
cpe:2.3:a:mozilla:firefox:0.1:*:*:*:*:*:*:* 1521
cpe:2.3:a:mozilla:firefox:0.3:*:*:*:*:*:*:* 1521
cpe:2.3:a:mozilla:firefox:0.7:*:*:*:*:*:*:* 1521
cpe:2.3:a:mozilla:firefox:0.7.1:*:*:*:*:*:*:* 1521
cpe:2.3:a:mozilla:firefox:0.2:*:*:*:*:*:*:* 1521
cpe:2.3:a:mozilla:firefox:0.4:*:*:*:*:*:*:* 1521
cpe:2.3:a:mozilla:firefox:0.5:*:*:*:*:*:*:* 1521
cpe:2.3:a:mozilla:firefox:1.0.6:*:linux:*:*:*:*:* 1521
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:x86:* 1521
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:x86:*:* 1521
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:iphone_os:*:* 1521
cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:* 1514
cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:* 1514
cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:* 1508
cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:* 1504
cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:* 1501
cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:* 1499
cpe:2.3:a:mozilla:firefox:1.4.1:*:*:*:*:*:*:* 1498
cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:* 1494
cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:* 1491
cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:* 1487
cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:* 1486
cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:* 1480

Related : CVE

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
9.8 2020-05-26 CVE-2020-6831

A buffer overflow could occur when parsing and validating SCTP chunks in WebRTC. This could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0.

7.5 2020-05-26 CVE-2020-6830

For native-to-JS bridging, the app requires a unique token to be passed that ensures non-app code can't call the bridging functions. That token was being used for JS-to-native also, but it isn't needed in this case, and its usage was also leaking this token. This vulnerability affects Firefox for iOS < 25.

9.8 2020-05-26 CVE-2020-12396

Mozilla developers and community members reported memory safety bugs present in Firefox 75. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 76.

9.8 2020-05-26 CVE-2020-12395

Mozilla developers and community members reported memory safety bugs present in Firefox 75 and Firefox ESR 68.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0.

3.3 2020-05-26 CVE-2020-12394

A logic flaw in our location bar implementation could have allowed a local attacker to spoof the current location by selecting a different origin and removing focus from the input element. This vulnerability affects Firefox < 76.

7.8 2020-05-26 CVE-2020-12393

The 'Copy as cURL' feature of Devtools' network tab did not properly escape the HTTP method of a request, which can be controlled by the website. If a user used the 'Copy as cURL' feature and pasted the command into a terminal, it could have resulted in command injection and arbitrary command execution. *Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0.

5.5 2020-05-26 CVE-2020-12392

The 'Copy as cURL' feature of Devtools' network tab did not properly escape the HTTP POST data of a request, which can be controlled by the website. If a user used the 'Copy as cURL' feature and pasted the command into a terminal, it could have resulted in the disclosure of local files. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0.

7.5 2020-05-26 CVE-2020-12391

Documents formed using data: URLs in an OBJECT element failed to inherit the CSP of the creating context. This allowed the execution of scripts that should have been blocked, albeit with a unique opaque origin. This vulnerability affects Firefox < 76.

9.8 2020-05-26 CVE-2020-12390

Incorrect origin serialization of URLs with IPv6 addresses could lead to incorrect security checks. This vulnerability affects Firefox < 76.

10 2020-05-26 CVE-2020-12389

The Firefox content processes did not sufficiently lockdown access control which could result in a sandbox escape. *Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox ESR < 68.8 and Firefox < 76.

10 2020-05-26 CVE-2020-12388

The Firefox content processes did not sufficiently lockdown access control which could result in a sandbox escape. *Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox ESR < 68.8 and Firefox < 76.

8.1 2020-05-26 CVE-2020-12387

A race condition when running shutdown code for Web Worker led to a use-after-free vulnerability. This resulted in a potentially exploitable crash. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0.

9.8 2020-04-24 CVE-2020-6826

Mozilla developers Tyson Smith, Bob Clary, and Alexandru Michis reported memory safety bugs present in Firefox 74. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 75.

9.8 2020-04-24 CVE-2020-6825

Mozilla developers and community members Tyson Smith and Christian Holler reported memory safety bugs present in Firefox 74 and Firefox ESR 68.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 68.7.0, Firefox ESR < 68.7, and Firefox < 75.

2.8 2020-04-24 CVE-2020-6824

Initially, a user opens a Private Browsing Window and generates a password for a site, then closes the Private Browsing Window but leaves Firefox open. Subsequently, if the user had opened a new Private Browsing Window, revisited the same site, and generated a new password - the generated passwords would have been identical, rather than independent. This vulnerability affects Firefox < 75.

9.8 2020-04-24 CVE-2020-6823

A malicious extension could have called browser.identity.launchWebAuthFlow, controlling the redirect_uri, and through the Promise returned, obtain the Auth code and gain access to the user's account at the service provider. This vulnerability affects Firefox < 75.

8.8 2020-04-24 CVE-2020-6822

On 32-bit builds, an out of bounds write could have occurred when processing an image larger than 4 GB in GMPDecodeData. It is possible that with enough effort this could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 68.7.0, Firefox ESR < 68.7, and Firefox < 75.

7.5 2020-04-24 CVE-2020-6821

When reading from areas partially or fully outside the source resource with WebGL's copyTexSubImage method, the specification requires the returned values be zero. Previously, this memory was uninitialized, leading to potentially sensitive data disclosure. This vulnerability affects Thunderbird < 68.7.0, Firefox ESR < 68.7, and Firefox < 75.

8.1 2020-04-24 CVE-2020-6820

Under certain conditions, when handling a ReadableStream, a race condition can cause a use-after-free. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Thunderbird < 68.7.0, Firefox < 74.0.1, and Firefox ESR < 68.6.1.

8.1 2020-04-24 CVE-2020-6819

Under certain conditions, when running the nsDocShell destructor, a race condition can cause a use-after-free. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Thunderbird < 68.7.0, Firefox < 74.0.1, and Firefox ESR < 68.6.1.

9.8 2020-03-25 CVE-2020-6815

Mozilla developers reported memory safety and script safety bugs present in Firefox 73. Some of these bugs showed evidence of memory corruption or escalation of privilege and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 74.

9.8 2020-03-25 CVE-2020-6814

Mozilla developers reported memory safety bugs present in Firefox and Thunderbird 68.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 68.6, Firefox < 74, Firefox < ESR68.6, and Firefox ESR < 68.6.

5.3 2020-03-25 CVE-2020-6813

When protecting CSS blocks with the nonce feature of Content Security Policy, the @import statement in the CSS block could allow an attacker to inject arbitrary styles, bypassing the intent of the Content Security Policy. This vulnerability affects Firefox < 74.

5.3 2020-03-25 CVE-2020-6812

The first time AirPods are connected to an iPhone, they become named after the user's name by default (e.g. Jane Doe's AirPods.) Websites with camera or microphone permission are able to enumerate device names, disclosing the user's name. To resolve this issue, Firefox added a special case that renames devices containing the substring 'AirPods' to simply 'AirPods'. This vulnerability affects Thunderbird < 68.6, Firefox < 74, Firefox < ESR68.6, and Firefox ESR < 68.6.

8.8 2020-03-25 CVE-2020-6811

The 'Copy as cURL' feature of Devtools' network tab did not properly escape the HTTP method of a request, which can be controlled by the website. If a user used the 'Copy as Curl' feature and pasted the command into a terminal, it could have resulted in command injection and arbitrary command execution. This vulnerability affects Thunderbird < 68.6, Firefox < 74, Firefox < ESR68.6, and Firefox ESR < 68.6.

CWE : Common Weakness Enumeration

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
%idName
21% (322) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
11% (172) CWE-399 Resource Management Errors
10% (166) CWE-20 Improper Input Validation
9% (149) CWE-264 Permissions, Privileges, and Access Controls
9% (139) CWE-200 Information Exposure
6% (97) CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting')
6% (94) CWE-416 Use After Free
3% (50) CWE-94 Failure to Control Generation of Code ('Code Injection')
3% (48) CWE-189 Numeric Errors
1% (25) CWE-254 Security Features
1% (23) CWE-310 Cryptographic Issues
1% (18) CWE-125 Out-of-bounds Read
1% (17) CWE-362 Race Condition
1% (17) CWE-17 Code
1% (16) CWE-787 Out-of-bounds Write
0% (14) CWE-346 Origin Validation Error
0% (13) CWE-284 Access Control (Authorization) Issues
0% (12) CWE-16 Configuration
0% (10) CWE-190 Integer Overflow or Wraparound
0% (9) CWE-287 Improper Authentication
0% (8) CWE-704 Incorrect Type Conversion or Cast
0% (8) CWE-352 Cross-Site Request Forgery (CSRF)
0% (8) CWE-269 Improper Privilege Management
0% (8) CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflo...
0% (8) CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path ...

CAPEC : Common Attack Pattern Enumeration & Classification

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Name
CAPEC-3 Using Leading 'Ghost' Character Sequences to Bypass Input Filters
CAPEC-7 Blind SQL Injection
CAPEC-8 Buffer Overflow in an API Call
CAPEC-9 Buffer Overflow in Local Command-Line Utilities
CAPEC-10 Buffer Overflow via Environment Variables
CAPEC-13 Subverting Environment Variable Values
CAPEC-14 Client-side Injection-induced Buffer Overflow
CAPEC-17 Accessing, Modifying or Executing Executable Files
CAPEC-18 Embedding Scripts in Nonscript Elements
CAPEC-22 Exploiting Trust in Client (aka Make the Client Invisible)
CAPEC-24 Filter Failure through Buffer Overflow
CAPEC-26 Leveraging Race Conditions
CAPEC-28 Fuzzing
CAPEC-29 Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions
CAPEC-30 Hijacking a Privileged Thread of Execution
CAPEC-31 Accessing/Intercepting/Modifying HTTP Cookies
CAPEC-32 Embedding Scripts in HTTP Query Strings
CAPEC-35 Leverage Executable Code in Nonexecutable Files
CAPEC-41 Using Meta-characters in E-mail Headers to Inject Malicious Payloads
CAPEC-42 MIME Conversion
CAPEC-43 Exploiting Multiple Input Interpretation Layers
CAPEC-44 Overflow Binary Resource File
CAPEC-45 Buffer Overflow via Symbolic Links
CAPEC-46 Overflow Variables and Tags
CAPEC-47 Buffer Overflow via Parameter Expansion

Oval Markup Language : Definitions

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
OvalID Name
oval:org.mitre.oval:def:3250 Mozilla, Firefox, Thunderbird POP3 SendUidl Buffer Overflow
oval:org.mitre.oval:def:11042 Heap-based buffer overflow in the SendUidl in the POP3 capability for Mozilla...
oval:org.mitre.oval:def:9240 Mozilla before 1.7, Firefox before 0.9, and Thunderbird before 0.7, allow rem...
oval:org.mitre.oval:def:3603 Mozilla, Firefox, Thunderbird Security Lock Icon Spoof Vulnerability
oval:org.mitre.oval:def:4403 Mozilla, Firefox, Thunderbird XPInstall Security Vulnerability
oval:org.mitre.oval:def:10032 Mozilla before 1.7, Firefox before 0.9, and Thunderbird before 0.7, allow rem...
oval:org.mitre.oval:def:9436 Mozilla Firefox 0.9.1 and 0.9.2 allows remote web sites to spoof certificates...
oval:org.mitre.oval:def:3989 Mozilla Firefox Certificate Spoofing Vulnerability
oval:org.mitre.oval:def:9419 Mozilla before 1.7, Firefox before 0.9, and Thunderbird before 0.7, allow rem...
oval:org.mitre.oval:def:2418 Mozilla, Firefox, Thunderbird User Interface Hijacking Vulnerability
oval:org.mitre.oval:def:11162 The cert_TestHostName function in Mozilla before 1.7, Firefox before 0.9, and...
oval:org.mitre.oval:def:10952 Integer overflow in the bitmap (BMP) decoder for Mozilla Firefox before the P...
oval:org.mitre.oval:def:10378 Mozilla Firefox before the Preview Release, Mozilla before 1.7.3, and Thunder...
oval:org.mitre.oval:def:10117 Mozilla before 1.7.6, and Firefox before 1.0.1, allows remote attackers to sp...
oval:org.mitre.oval:def:100045 Mozilla Popup Content Spoofing Vulnerability
oval:org.mitre.oval:def:10211 Firefox before 1.0 and Mozilla before 1.7.5 allows inactive (background) tabs...
oval:org.mitre.oval:def:100050 Mozilla Inactive Tab Dialog Box Vulnerability
oval:org.mitre.oval:def:100053 Mozilla Inactive Tab Form Data Theft Vulnerability
oval:org.mitre.oval:def:10756 Firefox before 1.0 and Mozilla before 1.7.5 allows inactive (background) tabs...
oval:org.mitre.oval:def:100057 Mozilla Local File Loading Vulnerability
oval:org.mitre.oval:def:9543 Mozilla before 1.7.6, and Firefox before 1.0.1, allows remote attackers to sp...
oval:org.mitre.oval:def:100056 Mozilla Creates World-readable temp Files
oval:org.mitre.oval:def:11297 Firefox before 1.0 and Mozilla before 1.7.5 display the SSL lock icon when an...
oval:org.mitre.oval:def:100055 Mozilla SSL Lock Image Spoofing during Binary Download
oval:org.mitre.oval:def:11016 Firefox before 1.0 and Mozilla before 1.7.5 allows inactive (background) tabs...

SAINT Exploits

Description Link
Mozilla Firefox JIT Escape Function Memory Corruption More info here
Mozilla Firefox PKCS11 Module Installation Code Execution More info here
Firefox AttributeChildRemoved Use After Free More info here
Mozilla Firefox document.write and DOM insertion memory corruption More info here
Mozilla Firefox GIF processing buffer overflow More info here
Mozilla Firefox nsTreeRange Use After Free More info here
Mozilla Firefox JavaScript Navigator object vulnerability More info here
Firefox sensor.dll Insecure Library Loading More info here
Mozilla Firefox OBJECT mChannel Use-After-Free More info here
Mozilla Firefox UTF-8 URL buffer overflow More info here
Mozilla Firefox onreadystatechange Event Use After Free More info here
Firefox DOMAttrModified nsSVGValue Observer Handling Out-of-bounds Memory Access More info here
Mozilla Firefox QueryInterface method memory corruption More info here
Mozilla Firefox XMLSerializer serializeToStream Use-after-free Vulnerability More info here
Firefox crypto.generateCRMFRequest command execution More info here

Open Source Vulnerability Database (OSVDB)

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
77956 Mozilla Multiple Product Large OGG <video> Element Handling Remote DoS
77955 Mozilla Multiple Product for Mac DOM Frame Deletion NULL Dereference Remote C...
77954 Mozilla Multiple Product SVG Animation accessKey Event Handling Disabled Java...
77953 Mozilla Multiple Product DOMAttrModified SVG Element Handling Out-of-bounds M...
77952 Mozilla Multiple Product Multiple Unspecified Remote Memory Corruption
77951 Mozilla Multiple Product YARR Regular Expression Library Javascript Parsing R...
77609 Mozilla Multiple Product CSS Token Sequence Parsing Timing Attack Remote Info...
77539 Mozilla Firefox Cache Objects IFRAME Handling Browsing History Disclosure
77534 Netscape Multiple DHTML Property Manipulation XSS
76955 Mozilla Multiple Product NoWaiverWrappers Internal Privilege Check Weakness R...
76954 Mozilla Multiple Product WebGL GPU Memory Random Image Disclosure
76953 Mozilla Multiple Product Windows D2D Hardware Acceleration Same Origin Policy...
76952 Mozilla Multiple Product Firebug JavaScript File Profiling Remote Memory Corr...
76951 Mozilla Multiple Product Multiple Unspecified Remote Memory Corruption (2011-...
76950 Mozilla Multiple Product Unchecked Allocation Failure Remote Memory Corruption
76949 Mozilla Multiple Product SVG <mpath> Non-SVG Link Remote Memory Corruption
76948 Mozilla Multiple Product Shift-JIS XSS
76947 Mozilla Multiple Product JSSubScriptLoader loadSubScript Method XPCNativeWrap...
75847 Mozilla Multiple Product Multiple Tab Handling Keystroke Disclosure
75846 Mozilla Multiple Product Use-after-free OGG File Handling Remote Code Execution
75845 Mozilla Multiple Product loadSubScript Method XPCNativeWrappers Unwrapping Re...
75844 Mozilla Multiple Product YARR Unspecified Memory Corruption
75843 Mozilla Multiple Product WebGL Test Case Unspecified Out-of-bounds Write Memo...
75842 Mozilla Multiple Product WebGL ANGLE GrowAtomTable() Function Overflow
75841 Mozilla Multiple Product Enter Key Download Dialog Verification Bypass

ExploitDB Exploits

id Description
34363 Firefox toString console.time Privileged Javascript Injection
30474 Firefox 5.0 - 15.0.1 - __exposedProps__ XCS Code Execution
27699 Mozilla Firefox 3.5.4 - Local Color Map Exploit
27698 Mozilla Firefox 3.6 - Integer Overflow Exploit
18531 Mozilla Firefox Firefox 4.0.1 Array.reduceRight() Exploit
17974 Mozilla Firefox Array.reduceRight() Integer Overflow Exploit
15342 Firefox Memory Corruption Proof of Concept (Simplified)
15104 MOAUB #25 - Mozilla Firefox CSS font-face Remote Code Execution Vulnerability
15027 MOAUB #17 - Firefox Plugin Parameter EnsureCachedAttrParamArrays Remote Code ...
14949 MOAUB #9 - Mozilla Firefox XSLT Sort Remote Code Execution Vulnerability
12678 Firefox 3.6.3 (latest) <= memory exhaustion crash vulnerabilities
10544 Mozilla Firefox Location Bar Spoofing Vulnerability
10380 Sunbird 0.9 Array Overrun (code execution) 0day
10187 Opera 10.01 Remote Array Overrun
10186 K-Meleon 1.5.3 Remote Array Overrun
10185 SeaMonkey 1.1.8 Remote Array Overrun
10184 KDE KDELibs 4.3.3 Remote Array Overrun
9663 Mozilla Firefox 2.0.0.16 UTF-8 URL Remote Buffer Overflow Exploit
3340 Mozilla Firefox <= 2.0.0.1 (location.hostname) Cross-Domain Vulnerability
2082 Mozilla Firefox <= 1.5.0.4 Javascript Navigator Object Code Execution PoC

OpenVAS Exploits

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2013-09-18 Name : Debian Security Advisory DSA 2406-1 (icedove - several vulnerabilities)
File : nvt/deb_2406_1.nasl
2013-09-18 Name : Debian Security Advisory DSA 2457-2 (iceweasel - several vulnerabilities)
File : nvt/deb_2457_2.nasl
2013-09-18 Name : Debian Security Advisory DSA 2458-2 (iceape - several vulnerabilities)
File : nvt/deb_2458_2.nasl
2013-09-18 Name : Debian Security Advisory DSA 2513-1 (iceape - several vulnerabilities)
File : nvt/deb_2513_1.nasl
2013-09-18 Name : Debian Security Advisory DSA 2553-1 (iceweasel - several vulnerabilities)
File : nvt/deb_2553_1.nasl
2013-09-18 Name : Debian Security Advisory DSA 2583-1 (iceweasel - several vulnerabilities)
File : nvt/deb_2583_1.nasl
2013-09-18 Name : Debian Security Advisory DSA 2584-1 (iceape - several vulnerabilities)
File : nvt/deb_2584_1.nasl
2013-09-18 Name : Debian Security Advisory DSA 2588-1 (icedove - several vulnerabilities)
File : nvt/deb_2588_1.nasl
2013-04-01 Name : Mozilla Firefox ESR Code Execution Vulnerabilities - November12 (Mac OS X)
File : nvt/gb_mozilla_firefox_esr_code_exec_vuln_nov12_macosx.nasl
2013-04-01 Name : Mozilla Firefox ESR Code Execution Vulnerabilities - November12 (Windows)
File : nvt/gb_mozilla_firefox_esr_code_exec_vuln_nov12_win.nasl
2012-12-13 Name : SuSE Update for MozillaFirefox, openSUSE-SU-2012:0760-1 (MozillaFirefox,)
File : nvt/gb_suse_2012_0760_1.nasl
2012-12-13 Name : SuSE Update for MozillaFirefox openSUSE-SU-2012:0899-1 (MozillaFirefox)
File : nvt/gb_suse_2012_0899_1.nasl
2012-12-13 Name : SuSE Update for MozillaThunderbird openSUSE-SU-2012:0917-1 (MozillaThunderbird)
File : nvt/gb_suse_2012_0917_1.nasl
2012-12-13 Name : SuSE Update for xulrunner openSUSE-SU-2012:0924-1 (xulrunner)
File : nvt/gb_suse_2012_0924_1.nasl
2012-12-13 Name : SuSE Update for seamonkey openSUSE-SU-2012:0935-1 (seamonkey)
File : nvt/gb_suse_2012_0935_1.nasl
2012-12-13 Name : SuSE Update for MozillaFirefox openSUSE-SU-2012:1064-1 (MozillaFirefox)
File : nvt/gb_suse_2012_1064_1.nasl
2012-12-13 Name : SuSE Update for MozillaFirefox openSUSE-SU-2012:1345-1 (MozillaFirefox)
File : nvt/gb_suse_2012_1345_1.nasl
2012-12-13 Name : SuSE Update for Mozilla Suite openSUSE-SU-2012:1412-1 (Mozilla Suite)
File : nvt/gb_suse_2012_1412_1.nasl
2012-12-06 Name : Fedora Update for seamonkey FEDORA-2012-18931
File : nvt/gb_fedora_2012_18931_seamonkey_fc16.nasl
2012-12-06 Name : Fedora Update for seamonkey FEDORA-2012-18952
File : nvt/gb_fedora_2012_18952_seamonkey_fc17.nasl
2012-12-04 Name : Debian Security Advisory DSA 2579-1 (apache2)
File : nvt/deb_2579_1.nasl
2012-12-04 Name : Ubuntu Update for firefox USN-1638-3
File : nvt/gb_ubuntu_USN_1638_3.nasl
2012-11-26 Name : FreeBSD Ports: firefox
File : nvt/freebsd_firefox72.nasl
2012-11-26 Name : Mozilla Firefox Code Execution Vulnerabilities - November12 (Mac OS X)
File : nvt/gb_mozilla_firefox_code_exec_vuln_nov12_macosx.nasl
2012-11-26 Name : Mozilla Firefox Code Execution Vulnerabilities - November12 (Windows)
File : nvt/gb_mozilla_firefox_code_exec_vuln_nov12_win.nasl

Information Assurance Vulnerability Management (IAVM)

id Description
2015-A-0223 Multiple Security Vulnerabilities in Mozilla Products
Severity: Category I - VMSKEY: V0061473
2015-A-0158 Multiple Vulnerabilities in Oracle Java SE
Severity: Category I - VMSKEY: V0061089
2014-A-0113 Multiple Vulnerabilities in Mozilla Products
Severity: Category I - VMSKEY: V0053309
2014-A-0082 Multiple Vulnerabilities in Mozilla Products
Severity: Category I - VMSKEY: V0052487
2014-A-0064 Multiple Vulnerabilities in Mozilla Products
Severity: Category I - VMSKEY: V0050011
2014-A-0043 Multiple Vulnerabilities in Mozilla Products
Severity: Category I - VMSKEY: V0046769
2014-A-0030 Apple Mac OS X Security Update 2014-001
Severity: Category I - VMSKEY: V0044547
2014-A-0021 Multiple Vulnerabilities in Mozilla Products
Severity: Category I - VMSKEY: V0043921
2014-A-0009 Multiple Vulnerabilities in Oracle Fusion Middleware
Severity: Category I - VMSKEY: V0043395
2013-A-0233 Multiple Vulnerabilities in Mozilla Products
Severity: Category I - VMSKEY: V0042596
2013-A-0220 Multiple Vulnerabilities in Mozilla Products
Severity: Category I - VMSKEY: V0042380
2013-A-0203 Multiple Vulnerabilities in Mozilla Products
Severity: Category I - VMSKEY: V0041365
2013-A-0199 Multiple Vulnerabilities in Oracle Fusion Middleware
Severity: Category I - VMSKEY: V0040786
2012-A-0189 Multiple Vulnerabilities in VMware ESXi 4.1 and ESX 4.1
Severity: Category I - VMSKEY: V0035032
2012-A-0048 Multiple Vulnerabilities in VMware vCenter Update Manager 5.0
Severity: Category I - VMSKEY: V0031901
2012-B-0006 Microsoft SSL/TLS Information Disclosure Vulnerability
Severity: Category I - VMSKEY: V0031054
2011-A-0160 Multiple Vulnerabilities in VMware vCenter Server 4.0 and vCenter Update Mana...
Severity: Category I - VMSKEY: V0030769

Snort® IPS/IDS

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2014-01-10 Mozilla regular expression heap corruption attempt
RuleID : 8443 - Type : BROWSER-FIREFOX - Revision : 15
2014-01-10 Mozilla regular expression heap corruption attempt
RuleID : 8442 - Type : SMTP - Revision : 2
2014-01-10 Mozilla javascript navigator object access
RuleID : 8058 - Type : BROWSER-FIREFOX - Revision : 11
2014-01-10 Mozilla GIF multipacket heap overflow - ANIMEXTS1.0
RuleID : 6503 - Type : WEB-CLIENT - Revision : 9
2014-01-10 Mozilla GIF single packet heap overflow - ANIMEXTS1.0
RuleID : 6502 - Type : FILE-IMAGE - Revision : 15
2020-05-07 Mozilla Firefox potential use after free attempt
RuleID : 53581 - Type : BROWSER-FIREFOX - Revision : 1
2020-05-07 Mozilla Firefox potential use after free attempt
RuleID : 53580 - Type : BROWSER-FIREFOX - Revision : 1
2020-02-11 Mozilla multiple products SharedWorker MessagePort memory corruption attempt
RuleID : 52569 - Type : BROWSER-FIREFOX - Revision : 1
2020-01-16 Mozilla Firefox JavaScript engine integer overflow attempt
RuleID : 52473 - Type : BROWSER-FIREFOX - Revision : 1
2020-01-16 Mozilla Firefox JavaScript engine integer overflow attempt
RuleID : 52472 - Type : BROWSER-FIREFOX - Revision : 1
2020-01-14 IonMonkey MArraySlice buffer overflow attempt
RuleID : 52431 - Type : BROWSER-FIREFOX - Revision : 1
2020-01-14 IonMonkey MArraySlice buffer overflow attempt
RuleID : 52430 - Type : BROWSER-FIREFOX - Revision : 1
2020-01-14 Mozilla Firefox RemotePrompt sandbox escape attempt
RuleID : 52425 - Type : BROWSER-FIREFOX - Revision : 1
2020-01-14 Mozilla Firefox RemotePrompt sandbox escape attempt
RuleID : 52424 - Type : BROWSER-FIREFOX - Revision : 1
2019-10-08 Mozilla Firefox Custom Elements write-after-free attempt
RuleID : 51440 - Type : BROWSER-FIREFOX - Revision : 1
2019-10-08 Mozilla Firefox Custom Elements write-after-free attempt
RuleID : 51439 - Type : BROWSER-FIREFOX - Revision : 1
2019-10-08 Mozilla Firefox GeckoActiveXObject exploit attempt
RuleID : 51394 - Type : BROWSER-OTHER - Revision : 2
2019-10-08 Mozilla Firefox GeckoActiveXObject exploit attempt
RuleID : 51393 - Type : BROWSER-OTHER - Revision : 2
2019-08-13 Mozilla Firefox RemotePrompt sandbox escape attempt
RuleID : 50697 - Type : BROWSER-FIREFOX - Revision : 2
2019-08-13 Mozilla Firefox RemotePrompt sandbox escape attempt
RuleID : 50696 - Type : BROWSER-FIREFOX - Revision : 2
2019-07-31 Mozilla Firefox Array.prototype.pop type confusion attempt
RuleID : 50519 - Type : BROWSER-FIREFOX - Revision : 2
2019-07-31 Mozilla Firefox Array.prototype.pop type confusion attempt
RuleID : 50518 - Type : BROWSER-FIREFOX - Revision : 2
2019-05-24 Mozilla Firefox DOMSVGLength appendItem use after free attempt
RuleID : 49918 - Type : BROWSER-FIREFOX - Revision : 1
2019-05-24 Mozilla Firefox DOMSVGLength appendItem use after free attempt
RuleID : 49917 - Type : BROWSER-FIREFOX - Revision : 1
2019-01-17 Mozilla Firefox method array.prototype.push remote code execution attempt
RuleID : 48626 - Type : BROWSER-FIREFOX - Revision : 2

Nessus® Vulnerability Scanner

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-34f7f68029.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-def329f680.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-fd194a1f14.nasl - Type: ACT_GATHER_INFO
2018-12-28 Name: The remote EulerOS host is missing multiple security updates.
File: EulerOS_SA-2018-1414.nasl - Type: ACT_GATHER_INFO
2018-12-27 Name: The remote CentOS host is missing a security update.
File: centos_RHSA-2018-3831.nasl - Type: ACT_GATHER_INFO
2018-12-27 Name: The remote CentOS host is missing a security update.
File: centos_RHSA-2018-3833.nasl - Type: ACT_GATHER_INFO
2018-12-18 Name: A web browser installed on the remote macOS host is affected by multiple vuln...
File: macosx_firefox_62_0.nasl - Type: ACT_GATHER_INFO
2018-12-14 Name: The remote Debian host is missing a security update.
File: debian_DLA-1605.nasl - Type: ACT_GATHER_INFO
2018-12-13 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-4354.nasl - Type: ACT_GATHER_INFO
2018-12-13 Name: The remote FreeBSD host is missing one or more security-related updates.
File: freebsd_pkg_d10b49b28d0249e8afde0844626317af.nasl - Type: ACT_GATHER_INFO
2018-12-12 Name: A web browser installed on the remote macOS host is affected by multiple vuln...
File: macosx_firefox_60_4_esr.nasl - Type: ACT_GATHER_INFO
2018-12-12 Name: A web browser installed on the remote macOS host is affected by multiple vuln...
File: macosx_firefox_64_0.nasl - Type: ACT_GATHER_INFO
2018-12-12 Name: A web browser installed on the remote Windows host is affected by multiple vu...
File: mozilla_firefox_60_4_esr.nasl - Type: ACT_GATHER_INFO
2018-12-12 Name: A web browser installed on the remote Windows host is affected by multiple vu...
File: mozilla_firefox_64_0.nasl - Type: ACT_GATHER_INFO
2018-12-11 Name: The remote EulerOS host is missing multiple security updates.
File: EulerOS_SA-2018-1384.nasl - Type: ACT_GATHER_INFO
2018-11-27 Name: The remote Virtuozzo host is missing a security update.
File: Virtuozzo_VZLSA-2017-2831.nasl - Type: ACT_GATHER_INFO
2018-11-27 Name: The remote Virtuozzo host is missing a security update.
File: Virtuozzo_VZLSA-2017-2832.nasl - Type: ACT_GATHER_INFO
2018-11-27 Name: The remote Virtuozzo host is missing a security update.
File: Virtuozzo_VZLSA-2017-2885.nasl - Type: ACT_GATHER_INFO
2018-11-26 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201811-10.nasl - Type: ACT_GATHER_INFO
2018-11-26 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201811-13.nasl - Type: ACT_GATHER_INFO
2018-11-21 Name: The remote CentOS host is missing a security update.
File: centos_RHSA-2018-3531.nasl - Type: ACT_GATHER_INFO
2018-11-21 Name: The remote CentOS host is missing a security update.
File: centos_RHSA-2018-3532.nasl - Type: ACT_GATHER_INFO
2018-11-13 Name: The remote Debian host is missing a security update.
File: debian_DLA-1575.nasl - Type: ACT_GATHER_INFO
2018-11-13 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-4337.nasl - Type: ACT_GATHER_INFO
2018-11-09 Name: The remote CentOS host is missing a security update.
File: centos_RHSA-2018-3403.nasl - Type: ACT_GATHER_INFO