Mozilla

Firefox

2939 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.71%
  • Veröffentlicht 25.02.2015 11:59:04
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Multiple use-after-free vulnerabilities in OpenType Sanitiser, as used in Mozilla Firefox before 36.0, might allow remote attackers to trigger problematic Developer Console information or possibly have unspecified other impact by leveraging incorrect...

  • EPSS 0.64%
  • Veröffentlicht 25.02.2015 11:59:03
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The Form Autocompletion feature in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allows remote attackers to read arbitrary files via crafted JavaScript code.

  • EPSS 1.34%
  • Veröffentlicht 25.02.2015 11:59:02
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Mozilla Firefox before 36.0 allows user-assisted remote attackers to read arbitrary files or execute arbitrary JavaScript code with chrome privileges via a crafted web site that is accessed with unspecified mouse and keyboard actions.

  • EPSS 0.34%
  • Veröffentlicht 25.02.2015 11:59:01
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Mozilla Firefox before 36.0 does not properly restrict transitions of JavaScript objects from a non-extensible state to an extensible state, which allows remote attackers to bypass a Caja Compiler sandbox protection mechanism or a Secure EcmaScript s...

  • EPSS 0.91%
  • Veröffentlicht 25.02.2015 11:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The UITour::onPageEvent function in Mozilla Firefox before 36.0 does not ensure that an API call originates from a foreground tab, which allows remote attackers to conduct spoofing and clickjacking attacks by leveraging access to a UI Tour web site.

  • EPSS 1.35%
  • Veröffentlicht 14.01.2015 11:59:11
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Mozilla Firefox before 35.0 on Windows allows remote attackers to bypass the Gecko Media Plugin (GMP) sandbox protection mechanism by leveraging access to the GMP process, as demonstrated by the OpenH264 plugin's process.

  • EPSS 0.66%
  • Veröffentlicht 14.01.2015 11:59:10
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Mozilla Firefox before 35.0 and SeaMonkey before 2.32 do not consider the id-pkix-ocsp-nocheck extension in deciding whether to trust an OCSP responder, which makes it easier for remote attackers to obtain sensitive information by sniffing the networ...

  • EPSS 1.52%
  • Veröffentlicht 14.01.2015 11:59:09
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Use-after-free vulnerability in the WebRTC implementation in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, and SeaMonkey before 2.32 allows remote attackers to execute arbitrary code via crafted track data.

  • EPSS 1.14%
  • Veröffentlicht 14.01.2015 11:59:08
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The mozilla::dom::AudioParamTimeline::AudioNodeInputValue function in the Web Audio API implementation in Mozilla Firefox before 35.0 and SeaMonkey before 2.32 does not properly restrict timeline operations, which allows remote attackers to cause a d...

  • EPSS 0.5%
  • Veröffentlicht 14.01.2015 11:59:07
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The navigator.sendBeacon implementation in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, Thunderbird before 31.4, and SeaMonkey before 2.32 omits the CORS Origin header, which allows remote attackers to bypass intended CORS access-contro...