Mozilla

Firefox

2867 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.5%
  • Published 26.04.2019 17:29:02
  • Last modified 21.11.2024 04:52:19

Cross-origin images can be read in violation of the same-origin policy by exporting an image after using createImageBitmap to read the image and then rendering the resulting bitmap image within a canvas element. This vulnerability affects Firefox < 6...

  • EPSS 0.19%
  • Published 26.04.2019 17:29:02
  • Last modified 21.11.2024 04:52:19

On Android systems, Firefox can load a library from APITRACE_LIB, which is writable by all users and applications. This could allow malicious third party applications to execute a man-in-the-middle attack if a malicious code was written to that locat...

  • EPSS 0.24%
  • Published 26.04.2019 17:29:02
  • Last modified 21.11.2024 04:52:19

Insufficient bounds checking of data during inter-process communication might allow a compromised content process to be able to read memory from the parent process under certain conditions. This vulnerability affects Firefox < 66.

  • EPSS 0.39%
  • Published 26.04.2019 17:29:02
  • Last modified 21.11.2024 04:52:20

Firefox will accept any registered Program ID as an external protocol handler and offer to launch this local application when given a matching URL on Windows operating systems. This should only happen if the program has specifically registered itself...

  • EPSS 2.19%
  • Published 26.04.2019 17:29:01
  • Last modified 21.11.2024 04:52:18

Mozilla developers and community members reported memory safety bugs present in Firefox 65, Firefox ESR 60.5, and Thunderbird 60.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these coul...

  • EPSS 0.44%
  • Published 26.04.2019 17:29:01
  • Last modified 21.11.2024 04:52:18

Mozilla developers and community members reported memory safety bugs present in Firefox 65. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. Th...

  • EPSS 0.76%
  • Published 26.04.2019 17:29:01
  • Last modified 21.11.2024 04:52:18

A use-after-free vulnerability can occur when a raw pointer to a DOM element on a page is obtained using JavaScript and the element is then removed while still in use. This results in a potentially exploitable crash. This vulnerability affects Thunde...

Exploit
  • EPSS 39.3%
  • Published 26.04.2019 17:29:01
  • Last modified 21.11.2024 04:52:18

The type inference system allows the compilation of functions that can cause type confusions between arbitrary objects when compiled through the IonMonkey just-in-time (JIT) compiler and when the constructor function is entered through on-stack repla...

Exploit
  • EPSS 19.72%
  • Published 26.04.2019 17:29:01
  • Last modified 21.11.2024 04:52:19

The IonMonkey just-in-time (JIT) compiler can leak an internal JS_OPTIMIZED_OUT magic value to the running script during a bailout. This magic value can then be used by JavaScript to achieve memory corruption, which results in a potentially exploitab...

  • EPSS 0.31%
  • Published 26.04.2019 17:29:01
  • Last modified 21.11.2024 04:52:19

A mechanism was discovered that removes some bounds checking for string, array, or typed array accesses if Spectre mitigations have been disabled. This vulnerability could allow an attacker to create an arbitrary value in compiled JavaScript, for whi...