When a user typed a URL in the address bar or the search bar and quickly hit the enter key, a website could sometimes capture that event and then redirect the user before navigation occurred to the desired, entered address. To construct a convincing spoof the attacker would have had to guess what the user was typing, perhaps by suggesting it. This vulnerability affects Firefox < 84.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "firefox", "binary_version": "84.0+build3-0ubuntu0.16.04.1" }, { "binary_name": "firefox-dev", "binary_version": "84.0+build3-0ubuntu0.16.04.1" }, { "binary_name": "firefox-geckodriver", "binary_version": "84.0+build3-0ubuntu0.16.04.1" }, { "binary_name": "firefox-mozsymbols", "binary_version": "84.0+build3-0ubuntu0.16.04.1" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_name": "firefox", "binary_version": "84.0+build3-0ubuntu0.18.04.1" }, { "binary_name": "firefox-dev", "binary_version": "84.0+build3-0ubuntu0.18.04.1" }, { "binary_name": "firefox-geckodriver", "binary_version": "84.0+build3-0ubuntu0.18.04.1" }, { "binary_name": "firefox-mozsymbols", "binary_version": "84.0+build3-0ubuntu0.18.04.1" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_name": "firefox", "binary_version": "84.0+build3-0ubuntu0.20.04.1" }, { "binary_name": "firefox-dev", "binary_version": "84.0+build3-0ubuntu0.20.04.1" }, { "binary_name": "firefox-geckodriver", "binary_version": "84.0+build3-0ubuntu0.20.04.1" }, { "binary_name": "firefox-mozsymbols", "binary_version": "84.0+build3-0ubuntu0.20.04.1" } ] }