Mozilla

Firefox

2920 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.57%
  • Veröffentlicht 11.06.2018 21:29:16
  • Zuletzt bearbeitet 21.11.2024 04:08:16

A mechanism to bypass Content Security Policy (CSP) protections on sites that have a "script-src" policy of "'strict-dynamic'". If a target website contains an HTML injection flaw an attacker could inject a reference to a copy of the "require.js" lib...

  • EPSS 0.39%
  • Veröffentlicht 11.06.2018 21:29:16
  • Zuletzt bearbeitet 21.11.2024 04:08:16

The JSON Viewer displays clickable hyperlinks for strings that are parseable as URLs, including "javascript:" links. If a JSON file contains malicious JavaScript script embedded as "javascript:" links, users may be tricked into clicking and running t...

  • EPSS 0.31%
  • Veröffentlicht 11.06.2018 21:29:16
  • Zuletzt bearbeitet 21.11.2024 04:08:16

A vulnerability exists in XSLT during number formatting where a negative buffer size may be allocated in some instances, leading to a buffer overflow and crash if it occurs. This vulnerability affects Firefox < 60.

  • EPSS 18.92%
  • Veröffentlicht 11.06.2018 21:29:16
  • Zuletzt bearbeitet 25.11.2025 17:50:16

A buffer overflow was found during UTF8 to Unicode string conversion within JavaScript with extremely large amounts of data. This vulnerability requires the use of a malicious or vulnerable legacy extension in order to occur. This vulnerability affec...

  • EPSS 1.76%
  • Veröffentlicht 11.06.2018 21:29:16
  • Zuletzt bearbeitet 21.11.2024 04:08:16

A use-after-free vulnerability can occur during WebGL operations. While this results in a potentially exploitable crash, the vulnerability is limited because the memory is freed and reused in a brief window of time during the freeing of the same call...

Exploit
  • EPSS 1.33%
  • Veröffentlicht 11.06.2018 21:29:16
  • Zuletzt bearbeitet 21.11.2024 04:08:17

If a URL using the "file:" protocol is dragged and dropped onto an open tab that is running in a different child process the tab will open a local file corresponding to the dropped URL, contrary to policy. One way to make the target tab open more rel...

  • EPSS 1.07%
  • Veröffentlicht 11.06.2018 21:29:16
  • Zuletzt bearbeitet 21.11.2024 04:08:17

If a text string that happens to be a filename in the operating system's native format is dragged and dropped onto the addressbar the specified local file will be opened. This is contrary to policy and is what would happen if the string were the equi...

  • EPSS 4.12%
  • Veröffentlicht 11.06.2018 21:29:16
  • Zuletzt bearbeitet 25.11.2025 17:50:16

Mozilla developers backported selected changes in the Skia library. These changes correct memory corruption issues including invalid buffer reads and writes during graphic operations. This vulnerability affects Thunderbird ESR < 52.8, Thunderbird < 5...

  • EPSS 0.48%
  • Veröffentlicht 11.06.2018 21:29:15
  • Zuletzt bearbeitet 21.11.2024 04:08:13

WebExtensions with the appropriate permissions can attach content scripts to Mozilla sites such as accounts.firefox.com and listen to network traffic to the site through the "webRequest" API. For example, this allows for the interception of username ...

  • EPSS 1.31%
  • Veröffentlicht 11.06.2018 21:29:15
  • Zuletzt bearbeitet 21.11.2024 04:08:13

If websocket data is sent with mixed text and binary in a single message, the binary data can be corrupted. This can result in an out-of-bounds read with the read memory sent to the originating server in response. This vulnerability affects Firefox <...