One phishing tactic on the web is to provide a link with HTTP Auth. For example https://www.phishingtarget.com@evil.com. To mitigate this type of attack, Firefox will display a warning dialog; however, this warning dialog would not have been displayed if evil.com used a redirect that was cached by the browser. This vulnerability affects Firefox < 86.
| Name | Vendor | Start Version | End Version | 
|---|---|---|---|
| Firefox | Mozilla | * | 86.0 (excluding) | 
| Firefox | Ubuntu | bionic | * | 
| Firefox | Ubuntu | devel | * | 
| Firefox | Ubuntu | focal | * | 
| Firefox | Ubuntu | groovy | * | 
| Firefox | Ubuntu | hirsute | * | 
| Firefox | Ubuntu | impish | * | 
| Firefox | Ubuntu | jammy | * | 
| Firefox | Ubuntu | kinetic | * | 
| Firefox | Ubuntu | lunar | * | 
| Firefox | Ubuntu | mantic | * | 
| Firefox | Ubuntu | noble | * | 
| Firefox | Ubuntu | trusty | * | 
| Firefox | Ubuntu | upstream | * | 
| Firefox | Ubuntu | xenial | * | 
| Mozjs38 | Ubuntu | bionic | * | 
| Mozjs38 | Ubuntu | esm-apps/bionic | * | 
| Mozjs38 | Ubuntu | upstream | * | 
| Mozjs52 | Ubuntu | bionic | * | 
| Mozjs52 | Ubuntu | esm-apps/focal | * | 
| Mozjs52 | Ubuntu | esm-infra/bionic | * | 
| Mozjs52 | Ubuntu | focal | * | 
| Mozjs52 | Ubuntu | groovy | * | 
| Mozjs52 | Ubuntu | upstream | * | 
| Mozjs60 | Ubuntu | upstream | * | 
| Mozjs68 | Ubuntu | esm-infra/focal | * | 
| Mozjs68 | Ubuntu | focal | * | 
| Mozjs68 | Ubuntu | groovy | * | 
| Mozjs68 | Ubuntu | upstream | * | 
| Mozjs78 | Ubuntu | esm-apps/jammy | * | 
| Mozjs78 | Ubuntu | groovy | * | 
| Mozjs78 | Ubuntu | hirsute | * | 
| Mozjs78 | Ubuntu | impish | * | 
| Mozjs78 | Ubuntu | jammy | * | 
| Mozjs78 | Ubuntu | kinetic | * | 
| Mozjs78 | Ubuntu | lunar | * | 
| Mozjs78 | Ubuntu | upstream | * |