{"id":"CVE-2018-12399","details":"When a new protocol handler is registered, the API accepts a title argument which can be used to mislead users about which domain is registering the new protocol. This may result in the user approving a protocol handler that they otherwise would not have. This vulnerability affects Firefox \u003c 63.","modified":"2026-05-04T08:23:56.270486Z","published":"2019-02-28T18:29:01.023Z","withdrawn":"2026-05-04T08:23:56.270486Z","related":["openSUSE-SU-2024:10600-1","openSUSE-SU-2024:14572-1"],"references":[{"type":"ADVISORY","url":"https://usn.ubuntu.com/3801-1/"},{"type":"ADVISORY","url":"https://www.mozilla.org/security/advisories/mfsa2018-26/"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/105721"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1041944"},{"type":"REPORT","url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1490276"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-12399.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"63.0"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.10"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}]}