Mozilla

Firefox

2867 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.31%
  • Published 11.06.2018 21:29:15
  • Last modified 21.11.2024 04:08:13

If websocket data is sent with mixed text and binary in a single message, the binary data can be corrupted. This can result in an out-of-bounds read with the read memory sent to the originating server in response. This vulnerability affects Firefox <...

  • EPSS 3.07%
  • Published 11.06.2018 21:29:15
  • Last modified 21.11.2024 04:08:13

A use-after-free vulnerability can occur while enumerating attributes during SVG animations with clip paths. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.8, Thunderbird ESR < 52.8, Firefox < 60, and Fir...

  • EPSS 3.07%
  • Published 11.06.2018 21:29:15
  • Last modified 21.11.2024 04:08:13

A use-after-free vulnerability can occur while adjusting layout during SVG animations with text paths. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.8, Thunderbird ESR < 52.8, Firefox < 60, and Firefox E...

  • EPSS 0.62%
  • Published 11.06.2018 21:29:15
  • Last modified 21.11.2024 04:08:13

Same-origin protections for the PDF viewer can be bypassed, allowing a malicious site to intercept messages meant for the viewer. This could allow the site to retrieve PDF files restricted to viewing by an authenticated user on a third-party website....

  • EPSS 58.98%
  • Published 11.06.2018 21:29:15
  • Last modified 21.11.2024 04:08:14

The PDF viewer does not sufficiently sanitize PostScript calculator functions, allowing malicious JavaScript to be injected through a crafted PDF file. This JavaScript can then be run with the permissions of the PDF viewer by its worker. This vulnera...

Exploit
  • EPSS 40.64%
  • Published 11.06.2018 21:29:15
  • Last modified 21.11.2024 04:08:14

An integer overflow can occur in the Skia library due to 32-bit integer use in an array without integer overflow checks, resulting in possible out-of-bounds writes. This could lead to a potentially exploitable crash triggerable by web content. This v...

  • EPSS 2.37%
  • Published 11.06.2018 21:29:15
  • Last modified 21.11.2024 04:08:14

WebRTC can use a "WrappedI420Buffer" pixel buffer but the owning image object can be freed while it is still in use. This can result in the WebRTC encoder using uninitialized memory, leading to a potentially exploitable crash. This vulnerability affe...

  • EPSS 2.08%
  • Published 11.06.2018 21:29:15
  • Last modified 21.11.2024 04:08:14

If a malicious attacker has used another vulnerability to gain full control over a content process, they may be able to replace the alternate data resources stored in the JavaScript Start-up Bytecode Cache (JSBC) for other JavaScript code. If the par...

  • EPSS 0.34%
  • Published 11.06.2018 21:29:15
  • Last modified 21.11.2024 04:08:14

Content Security Policy (CSP) is not applied correctly to all parts of multipart content sent with the "multipart/x-mixed-replace" MIME type. This could allow for script to run where CSP should block it, allowing for cross-site scripting (XSS) and ot...

Exploit
  • EPSS 0.77%
  • Published 11.06.2018 21:29:15
  • Last modified 21.11.2024 04:08:15

In 32-bit versions of Firefox, the Adobe Flash plugin setting for "Enable Adobe Flash protected mode" is unchecked by default even though the Adobe Flash sandbox is actually enabled. The displayed state is the reverse of the true setting, resulting i...