Total vulnerabilities in the database
If a URL using the "file:" protocol is dragged and dropped onto an open tab that is running in a different child process the tab will open a local file corresponding to the dropped URL, contrary to policy. One way to make the target tab open more reliably in a separate process is to open it with the "noopener" keyword. This vulnerability affects Firefox < 60.
Software | From | Fixed in |
---|---|---|
canonical / ubuntu_linux | 16.04 | 16.04.x |
canonical / ubuntu_linux | 14.04 | 14.04.x |
canonical / ubuntu_linux | 17.10 | 17.10.x |
canonical / ubuntu_linux | 18.04 | 18.04.x |
mozilla / firefox | - | 60.0 |