Mozilla

Firefox

2918 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.11%
  • Veröffentlicht 26.11.2024 14:15:21
  • Zuletzt bearbeitet 28.10.2025 15:16:07

Accessing a non-secure HTTP site that uses a non-existent port may cause the SSL padlock icon in the location URL bar to, misleadingly, appear secure. This vulnerability affects Firefox for iOS < 133.

  • EPSS 0.08%
  • Veröffentlicht 26.11.2024 14:15:21
  • Zuletzt bearbeitet 04.04.2025 16:15:43

Under certain circumstances, navigating to a webpage would result in the address missing from the location URL bar, making it unclear what the URL was for the loaded webpage. This vulnerability affects Firefox for iOS < 133.

  • EPSS 0.18%
  • Veröffentlicht 26.11.2024 14:15:20
  • Zuletzt bearbeitet 07.04.2025 19:39:00

A null pointer dereference may have inadvertently occurred in `pk12util`, and specifically in the `SEC_ASN1DecodeItem_Util` function, when handling malformed or improperly formatted input files. This vulnerability affects Firefox < 133 and Thunderbir...

  • EPSS 0.1%
  • Veröffentlicht 26.11.2024 14:15:20
  • Zuletzt bearbeitet 27.11.2024 15:15:24

Missing thread synchronization primitives could have led to a data race on members of the PlaybackParams structure. This vulnerability affects Firefox < 133 and Thunderbird < 133.

  • EPSS 0.27%
  • Veröffentlicht 26.11.2024 14:15:19
  • Zuletzt bearbeitet 03.11.2025 22:16:38

A crafted URL containing Arabic script and whitespace characters could have hidden the true origin of the page, resulting in a potential spoofing attack. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thunderbir...

  • EPSS 0.18%
  • Veröffentlicht 26.11.2024 14:15:19
  • Zuletzt bearbeitet 03.11.2025 22:16:38

The application failed to account for exceptions thrown by the `loadManifestFromFile` method during add-on signature verification. This flaw, triggered by an invalid or unsupported extension manifest, could have caused runtime errors that disrupted t...

  • EPSS 0.37%
  • Veröffentlicht 26.11.2024 14:15:19
  • Zuletzt bearbeitet 03.11.2025 22:16:38

When handling keypress events, an attacker may have been able to trick a user into bypassing the "Open Executable File?" confirmation dialog. This could have led to malicious code execution. This vulnerability affects Firefox < 133, Firefox ESR < 128...

  • EPSS 0.67%
  • Veröffentlicht 26.11.2024 14:15:19
  • Zuletzt bearbeitet 27.11.2024 16:15:13

A flaw in handling fullscreen transitions may have inadvertently caused the application to become stuck in fullscreen mode when a modal dialog was opened during the transition. This issue left users unable to exit fullscreen mode using standard actio...

  • EPSS 0.35%
  • Veröffentlicht 26.11.2024 14:15:19
  • Zuletzt bearbeitet 03.11.2025 22:16:38

Memory safety bugs present in Firefox 132, Firefox ESR 128.4, and Thunderbird 128.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vu...

  • EPSS 0.13%
  • Veröffentlicht 26.11.2024 14:15:19
  • Zuletzt bearbeitet 03.04.2025 13:32:01

Malicious websites may have been able to perform user intent confirmation through tapjacking. This could have led to users unknowingly approving the launch of external applications, potentially exposing them to underlying vulnerabilities. This vulner...