Vulnerabilities > Mozilla > Firefox > 80.0.1
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-09-03 | CVE-2024-8383 | Unspecified vulnerability in Mozilla Firefox ESR Firefox normally asks for confirmation before asking the operating system to find an application to handle a scheme that the browser does not support. | 7.5 |
2024-09-03 | CVE-2024-8386 | Open Redirect vulnerability in Mozilla Firefox If a site had been granted the permission to open popup windows, it could cause Select elements to appear on top of another site to perform a spoofing attack. | 6.1 |
2024-09-03 | CVE-2024-8388 | Unspecified vulnerability in Mozilla Firefox Multiple prompts and panels from both Firefox and the Android OS could be used to obscure the notification announcing the transition to fullscreen mode after the fix for CVE-2023-6870 in Firefox 121. | 5.3 |
2024-08-06 | CVE-2024-7518 | Unspecified vulnerability in Mozilla Firefox Select options could obscure the fullscreen notification dialog. | 6.5 |
2024-08-06 | CVE-2024-7531 | Unspecified vulnerability in Mozilla Firefox Calling `PK11_Encrypt()` in NSS using CKM_CHACHA20 and the same buffer for input and output can result in plaintext on an Intel Sandy Bridge processor. | 6.5 |
2024-07-09 | CVE-2024-6608 | Unspecified vulnerability in Mozilla Firefox It was possible to move the cursor using pointerlock from an iframe. | 4.3 |
2024-07-09 | CVE-2024-6609 | Unspecified vulnerability in Mozilla Firefox When almost out-of-memory an elliptic curve key which was never allocated could have been freed again. | 8.8 |
2024-07-09 | CVE-2024-6610 | Unspecified vulnerability in Mozilla Firefox Form validation popups could capture escape key presses. | 4.3 |
2024-06-11 | CVE-2024-5689 | Unspecified vulnerability in Mozilla Firefox In addition to detecting when a user was taking a screenshot (XXX), a website was able to overlay the 'My Shots' button that appeared, and direct the user to a replica Firefox Screenshots page that could be used for phishing. | 4.3 |
2024-06-11 | CVE-2024-5690 | Information Exposure Through Discrepancy vulnerability in multiple products By monitoring the time certain operations take, an attacker could have guessed which external protocol handlers were functional on a user's system. | 4.3 |