Filtered by vendor Brave
Subscribe
Total
20 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2017-8459 | 1 Brave | 1 Brave | 2024-08-05 | 4.3 MEDIUM | 5.3 MEDIUM |
** DISPUTED ** Brave 0.12.4 has a Status Bar Obfuscation issue in which a redirection target is shown in a possibly unexpected way. NOTE: third parties dispute this issue because it is a behavior that might have legitimate applications in (for example) the display of web-search results. | |||||
CVE-2023-28364 | 1 Brave | 1 Browser | 2024-02-04 | N/A | 6.1 MEDIUM |
An Open Redirect vulnerability exists prior to version 1.52.117, where the built-in QR scanner in Brave Browser Android navigated to scanned URLs automatically without showing the URL first. Now the user must manually navigate to the URL. | |||||
CVE-2023-28360 | 1 Brave | 1 Brave | 2024-02-04 | N/A | 4.3 MEDIUM |
An omission of security-relevant information vulnerability exists in Brave desktop prior to version 1.48.171 when a user was saving a file there was no download safety check dialog presented to the user. | |||||
CVE-2022-47933 | 1 Brave | 1 Brave | 2024-02-04 | N/A | 6.5 MEDIUM |
Brave Browser before 1.42.51 allowed a remote attacker to cause a denial of service via a crafted HTML file that references the IPFS scheme. This vulnerability is caused by an uncaught exception in the function ipfs::OnBeforeURLRequest_IPFSRedirectWork() in ipfs_redirect_network_delegate_helper.cc. | |||||
CVE-2023-22798 | 1 Brave | 1 Adblock-lists | 2024-02-04 | N/A | 6.1 MEDIUM |
Prior to commit 51867e0d15a6d7f80d5b714fd0e9976b9c160bb0, https://github.com/brave/adblock-lists removed redirect interceptors on some websites like Facebook in which the redirect interceptor may have been there for security purposes. This could potentially cause open redirects on these websites. Brave's redirect interceptor removal feature is known as "debouncing" and is intended to remove unnecessary redirects that track users across the web. | |||||
CVE-2022-30334 | 1 Brave | 1 Brave | 2024-02-04 | 5.0 MEDIUM | 5.3 MEDIUM |
Brave before 1.34, when a Private Window with Tor Connectivity is used, leaks .onion URLs in Referer and Origin headers. NOTE: although this was fixed by Brave, the Brave documentation still advises "Note that Private Windows with Tor Connectivity in Brave are just regular private windows that use Tor as a proxy. Brave does NOT implement most of the privacy protections from Tor Browser." | |||||
CVE-2021-45884 | 4 Apple, Brave, Linux and 1 more | 4 Macos, Brave, Linux Kernel and 1 more | 2024-02-04 | 4.3 MEDIUM | 7.5 HIGH |
In Brave Desktop 1.17 through 1.33 before 1.33.106, when CNAME-based adblocking and a proxying extension with a SOCKS fallback are enabled, additional DNS requests are issued outside of the proxying extension using the system's DNS settings, resulting in information disclosure. NOTE: this issue exists because of an incomplete fix for CVE-2021-21323 and CVE-2021-22916. | |||||
CVE-2021-22929 | 1 Brave | 1 Brave | 2024-02-04 | 3.6 LOW | 6.1 MEDIUM |
An information disclosure exists in Brave Browser Desktop prior to version 1.28.62, where logged warning messages that included timestamps of connections to V2 onion domains in tor.log. | |||||
CVE-2021-22917 | 1 Brave | 1 Browser | 2024-02-04 | 4.3 MEDIUM | 6.5 MEDIUM |
Brave Browser Desktop between versions 1.17 and 1.20 is vulnerable to information disclosure by way of DNS requests in Tor windows not flowing through Tor if adblocking was enabled. | |||||
CVE-2021-22916 | 1 Brave | 1 Brave | 2024-02-04 | 4.3 MEDIUM | 5.9 MEDIUM |
In Brave Desktop between versions 1.17 and 1.26.60, when adblocking is enabled and a proxy browser extension is installed, the CNAME adblocking feature issues DNS requests that used the system DNS settings instead of the extension's proxy settings, resulting in possible information disclosure. | |||||
CVE-2020-8276 | 1 Brave | 1 Brave | 2024-02-04 | 2.1 LOW | 5.5 MEDIUM |
The implementation of Brave Desktop's privacy-preserving analytics system (P3A) between 1.1 and 1.18.35 logged the timestamp of when the user last opened an incognito window, including Tor windows. The intended behavior was to log the timestamp for incognito windows excluding Tor windows. Note that if a user has P3A enabled, the timestamp is not sent to Brave's server, but rather a value from:Used in last 24hUsed in last week but not 24hUsed in last 28 days but not weekEver used but not in last 28 daysNever usedThe privacy risk is low because a local attacker with disk access cannot tell if the timestamp corresponds to a Tor window or a non-Tor incognito window. | |||||
CVE-2021-21323 | 1 Brave | 1 Brave | 2024-02-04 | 4.3 MEDIUM | 5.3 MEDIUM |
Brave is an open source web browser with a focus on privacy and security. In Brave versions 1.17.73-1.20.103, the CNAME adblocking feature added in Brave 1.17.73 accidentally initiated DNS requests that bypassed the Brave Tor proxy. Users with adblocking enabled would leak DNS requests from Tor windows to their DNS provider. (DNS requests that were not initiated by CNAME adblocking would go through Tor as expected.) This is fixed in Brave version 1.20.108 | |||||
CVE-2018-1000815 | 1 Brave | 1 Brave | 2024-02-04 | 4.3 MEDIUM | 4.3 MEDIUM |
Brave Software Inc. Brave version version 0.22.810 to 0.24.0 contains a Other/Unknown vulnerability in function ContentSettingsObserver::AllowScript() in content_settings_observer.cc that can result in Websites can run inline JavaScript even if script is blocked, making attackers easier to track users. This attack appear to be exploitable via the victim must visit a specially crafted website. This vulnerability appears to have been fixed in 0.25.2. | |||||
CVE-2016-10718 | 1 Brave | 1 Brave Browser | 2024-02-04 | 5.0 MEDIUM | 7.5 HIGH |
Brave Browser before 0.13.0 allows a tab to close itself even if the tab was not opened by a script, resulting in denial of service. | |||||
CVE-2018-10798 | 1 Brave | 1 Brave | 2024-02-04 | 4.3 MEDIUM | 6.5 MEDIUM |
A hang issue was discovered in Brave before 0.14.0 (on, for example, Linux). The vulnerability is caused by mishandling of JavaScript code that triggers the reload of a page continuously with an interval of 1 second. | |||||
CVE-2017-18256 | 1 Brave | 1 Brave Browser | 2024-02-04 | 4.3 MEDIUM | 6.5 MEDIUM |
Brave Browser before 0.13.0 allows remote attackers to cause a denial of service (resource consumption) via a long alert() argument in JavaScript code, because window dialogs are mishandled. | |||||
CVE-2018-10799 | 1 Brave | 1 Brave | 2024-02-04 | 4.3 MEDIUM | 6.5 MEDIUM |
A hang issue was discovered in Brave before 0.14.0 (on, for example, Linux). This vulnerability is caused by the mishandling of a long URL formed by window.location+='?\u202a\uFEFF\u202b'; concatenation in a SCRIPT element. | |||||
CVE-2017-1000461 | 1 Brave | 1 Browser | 2024-02-04 | 4.3 MEDIUM | 4.7 MEDIUM |
Brave Software's Brave Browser, version 0.19.73 (and earlier) is vulnerable to an incorrect access control issue in the "JS fingerprinting blocking" component, resulting in a malicious website being able to access the fingerprinting-associated browser functionality (that the browser intends to block). | |||||
CVE-2017-8458 | 1 Brave | 1 Brave | 2024-02-04 | 4.3 MEDIUM | 6.5 MEDIUM |
Brave 0.12.4 has a URI Obfuscation issue in which a string such as https://safe.example.com@unsafe.example.com/ is displayed without a clear UI indication that it is not a resource on the safe.example.com web site. | |||||
CVE-2016-9473 | 1 Brave | 1 Browser | 2024-02-04 | 4.3 MEDIUM | 4.7 MEDIUM |
Brave Browser iOS before 1.2.18 and Brave Browser Android 1.9.56 and earlier suffer from Full Address Bar Spoofing, allowing attackers to trick a victim by displaying a malicious page for legitimate domain names. |