Mozilla

Firefox

2867 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.58%
  • Veröffentlicht 25.02.2015 11:59:02
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Mozilla Firefox before 36.0 allows user-assisted remote attackers to read arbitrary files or execute arbitrary JavaScript code with chrome privileges via a crafted web site that is accessed with unspecified mouse and keyboard actions.

  • EPSS 0.34%
  • Veröffentlicht 25.02.2015 11:59:01
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Mozilla Firefox before 36.0 does not properly restrict transitions of JavaScript objects from a non-extensible state to an extensible state, which allows remote attackers to bypass a Caja Compiler sandbox protection mechanism or a Secure EcmaScript s...

  • EPSS 0.91%
  • Veröffentlicht 25.02.2015 11:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The UITour::onPageEvent function in Mozilla Firefox before 36.0 does not ensure that an API call originates from a foreground tab, which allows remote attackers to conduct spoofing and clickjacking attacks by leveraging access to a UI Tour web site.

  • EPSS 1.35%
  • Veröffentlicht 14.01.2015 11:59:11
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Mozilla Firefox before 35.0 on Windows allows remote attackers to bypass the Gecko Media Plugin (GMP) sandbox protection mechanism by leveraging access to the GMP process, as demonstrated by the OpenH264 plugin's process.

  • EPSS 0.66%
  • Veröffentlicht 14.01.2015 11:59:10
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Mozilla Firefox before 35.0 and SeaMonkey before 2.32 do not consider the id-pkix-ocsp-nocheck extension in deciding whether to trust an OCSP responder, which makes it easier for remote attackers to obtain sensitive information by sniffing the networ...

  • EPSS 1.84%
  • Veröffentlicht 14.01.2015 11:59:09
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Use-after-free vulnerability in the WebRTC implementation in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, and SeaMonkey before 2.32 allows remote attackers to execute arbitrary code via crafted track data.

  • EPSS 1.14%
  • Veröffentlicht 14.01.2015 11:59:08
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The mozilla::dom::AudioParamTimeline::AudioNodeInputValue function in the Web Audio API implementation in Mozilla Firefox before 35.0 and SeaMonkey before 2.32 does not properly restrict timeline operations, which allows remote attackers to cause a d...

  • EPSS 0.18%
  • Veröffentlicht 14.01.2015 11:59:07
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The navigator.sendBeacon implementation in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, Thunderbird before 31.4, and SeaMonkey before 2.32 omits the CORS Origin header, which allows remote attackers to bypass intended CORS access-contro...

  • EPSS 1.48%
  • Veröffentlicht 14.01.2015 11:59:07
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, Thunderbird before 31.4, and SeaMonkey before 2.32 do not properly interpret Set-Cookie headers within responses that have a 407 (aka Proxy Authentication Required) status code, which allows ...

  • EPSS 0.49%
  • Veröffentlicht 14.01.2015 11:59:06
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Mozilla Firefox before 35.0 and SeaMonkey before 2.32 do not properly initialize memory for BMP images, which allows remote attackers to obtain sensitive information from process memory via a crafted web page that triggers the rendering of malformed ...