logo
DATABASE RESOURCES PRICING ABOUT US

Mozilla Firefox ESR < 91.7

Description

The version of Firefox ESR installed on the remote Windows host is prior to 91.7. It is, therefore, affected by multiple vulnerabilities as referenced in the mfsa2022-11 advisory. - When resizing a popup after requesting fullscreen access, the popup would not display the fullscreen notification. (CVE-2022-26383) - If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. (CVE-2022-26384) - When installing an add-on, Firefox verified the signature before prompting the user; but while the user was confirming the prompt, the underlying add-on file could have been modified and Firefox would not have noticed. (CVE-2022-26387) - An attacker could have caused a use-after-free by forcing a text reflow in an SVG object leading to a potentially exploitable crash. (CVE-2022-26381) - Previously Firefox for macOS and Linux would download temporary files to a user-specific directory in <code>/tmp</code>, but this behavior was changed to download them to <code>/tmp</code> where they could be affected by other local users. This behavior was reverted to the original, user-specific directory. This bug only affects Firefox for macOS and Linux. Other operating systems are unaffected. (CVE-2022-26386) Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.


Related