CVE-2024-3854
- EPSS 1.01%
- Veröffentlicht 16.04.2024 16:15:08
- Zuletzt bearbeitet 01.04.2025 14:11:53
In some code patterns the JIT incorrectly optimized switch statements and generated code with out-of-bounds-reads. This vulnerability affects Firefox < 125, Firefox ESR < 115.10, and Thunderbird < 115.10.
CVE-2024-3855
- EPSS 0.21%
- Veröffentlicht 16.04.2024 16:15:08
- Zuletzt bearbeitet 31.03.2025 17:05:19
In certain cases the JIT incorrectly optimized MSubstr operations, which led to out-of-bounds reads. This vulnerability affects Firefox < 125.
CVE-2024-3856
- EPSS 0.69%
- Veröffentlicht 16.04.2024 16:15:08
- Zuletzt bearbeitet 31.03.2025 17:01:41
A use-after-free could occur during WASM execution if garbage collection ran during the creation of an array. This vulnerability affects Firefox < 125.
CVE-2024-3857
- EPSS 0.14%
- Veröffentlicht 16.04.2024 16:15:08
- Zuletzt bearbeitet 01.04.2025 14:16:11
The JIT created incorrect code for arguments in certain cases. This led to potential use-after-free crashes during garbage collection. This vulnerability affects Firefox < 125, Firefox ESR < 115.10, and Thunderbird < 115.10.
CVE-2024-3858
- EPSS 0.3%
- Veröffentlicht 16.04.2024 16:15:08
- Zuletzt bearbeitet 31.03.2025 16:47:40
It was possible to mutate a JavaScript object so that the JIT could crash while tracing it. This vulnerability affects Firefox < 125.
CVE-2024-3859
- EPSS 1.72%
- Veröffentlicht 16.04.2024 16:15:08
- Zuletzt bearbeitet 01.04.2025 14:22:25
On 32-bit versions there were integer-overflows that led to an out-of-bounds-read that potentially could be triggered by a malformed OpenType font. This vulnerability affects Firefox < 125, Firefox ESR < 115.10, and Thunderbird < 115.10.
CVE-2024-3860
- EPSS 0.05%
- Veröffentlicht 16.04.2024 16:15:08
- Zuletzt bearbeitet 31.03.2025 16:46:41
An out-of-memory condition during object initialization could result in an empty shape list. If the JIT subsequently traced the object it would crash. This vulnerability affects Firefox < 125.
- EPSS 0.13%
- Veröffentlicht 16.04.2024 16:15:08
- Zuletzt bearbeitet 01.04.2025 14:32:41
If an AlignedBuffer were assigned to itself, the subsequent self-move could result in an incorrect reference count and later use-after-free. This vulnerability affects Firefox < 125, Firefox ESR < 115.10, and Thunderbird < 115.10.
CVE-2024-3862
- EPSS 0.14%
- Veröffentlicht 16.04.2024 16:15:08
- Zuletzt bearbeitet 31.03.2025 16:45:53
The MarkStack assignment operator, part of the JavaScript engine, could access uninitialized memory if it were used in a self-assignment. This vulnerability affects Firefox < 125.
CVE-2024-3863
- EPSS 0.34%
- Veröffentlicht 16.04.2024 16:15:08
- Zuletzt bearbeitet 28.03.2025 19:15:22
The executable file warning was not presented when downloading .xrm-ms files. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.* This vulnerability affects Firefox < 125, Firefox ESR < 115.10, and Th...