Mozilla

Firefox

3102 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.1%
  • Veröffentlicht 16.04.2024 16:15:08
  • Zuletzt bearbeitet 01.04.2025 13:39:33

There was no limit to the number of HTTP/2 CONTINUATION frames that would be processed. A server could abuse this to create an Out of Memory condition in the browser. This vulnerability affects Firefox < 125, Firefox ESR < 115.10, and Thunderbird < 1...

  • EPSS 1.04%
  • Veröffentlicht 16.04.2024 16:15:08
  • Zuletzt bearbeitet 01.04.2025 13:39:19

GetBoundName could return the wrong version of an object when JIT optimizations were applied. This vulnerability affects Firefox < 125, Firefox ESR < 115.10, and Thunderbird < 115.10.

  • EPSS 0.09%
  • Veröffentlicht 16.04.2024 16:15:08
  • Zuletzt bearbeitet 31.03.2025 16:32:46

A use-after-free could result if a JavaScript realm was in the process of being initialized when a garbage collection started. This vulnerability affects Firefox < 125.

  • EPSS 0.93%
  • Veröffentlicht 16.04.2024 16:15:08
  • Zuletzt bearbeitet 01.04.2025 14:11:53

In some code patterns the JIT incorrectly optimized switch statements and generated code with out-of-bounds-reads. This vulnerability affects Firefox < 125, Firefox ESR < 115.10, and Thunderbird < 115.10.

  • EPSS 0.17%
  • Veröffentlicht 16.04.2024 16:15:08
  • Zuletzt bearbeitet 31.03.2025 17:05:19

In certain cases the JIT incorrectly optimized MSubstr operations, which led to out-of-bounds reads. This vulnerability affects Firefox < 125.

  • EPSS 0.47%
  • Veröffentlicht 16.04.2024 16:15:08
  • Zuletzt bearbeitet 31.03.2025 17:01:41

A use-after-free could occur during WASM execution if garbage collection ran during the creation of an array. This vulnerability affects Firefox < 125.

  • EPSS 0.15%
  • Veröffentlicht 16.04.2024 16:15:08
  • Zuletzt bearbeitet 01.04.2025 14:16:11

The JIT created incorrect code for arguments in certain cases. This led to potential use-after-free crashes during garbage collection. This vulnerability affects Firefox < 125, Firefox ESR < 115.10, and Thunderbird < 115.10.

  • EPSS 0.73%
  • Veröffentlicht 16.04.2024 16:15:08
  • Zuletzt bearbeitet 31.03.2025 16:47:40

It was possible to mutate a JavaScript object so that the JIT could crash while tracing it. This vulnerability affects Firefox < 125.

  • EPSS 2.14%
  • Veröffentlicht 16.04.2024 16:15:08
  • Zuletzt bearbeitet 01.04.2025 14:22:25

On 32-bit versions there were integer-overflows that led to an out-of-bounds-read that potentially could be triggered by a malformed OpenType font. This vulnerability affects Firefox < 125, Firefox ESR < 115.10, and Thunderbird < 115.10.

  • EPSS 0.05%
  • Veröffentlicht 16.04.2024 16:15:08
  • Zuletzt bearbeitet 31.03.2025 16:46:41

An out-of-memory condition during object initialization could result in an empty shape list. If the JIT subsequently traced the object it would crash. This vulnerability affects Firefox < 125.