Mozilla

Firefox

2920 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.28%
  • Veröffentlicht 09.12.2020 01:15:12
  • Zuletzt bearbeitet 21.11.2024 05:20:34

When a user downloaded a file in Firefox for Android, if a cookie is set, it would have been re-sent during a subsequent file download operation on the same domain, regardless of whether the original and subsequent request were in private and non-pri...

  • EPSS 0.43%
  • Veröffentlicht 09.12.2020 01:15:12
  • Zuletzt bearbeitet 21.11.2024 05:20:34

In some cases, removing HTML elements during sanitization would keep existing SVG event handlers and therefore lead to XSS. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

  • EPSS 0.24%
  • Veröffentlicht 28.10.2020 12:15:12
  • Zuletzt bearbeitet 21.11.2024 05:36:15

When performing EC scalar point multiplication, the wNAF point multiplication algorithm was used; which leaked partial information about the nonce used during signature generation. Given an electro-magnetic trace of a few signature generations, the p...

  • EPSS 0.32%
  • Veröffentlicht 22.10.2020 21:15:13
  • Zuletzt bearbeitet 21.11.2024 05:06:00

If a valid external protocol handler was referenced in an image tag, the resulting broken image size could be distinguished from a broken image size of a non-existent protocol handler. This allowed an attacker to successfully probe whether an externa...

  • EPSS 0.43%
  • Veröffentlicht 22.10.2020 21:15:13
  • Zuletzt bearbeitet 21.11.2024 05:06:00

When multiple WASM threads had a reference to a module, and were looking up exported functions, one WASM thread could have overwritten another's entry in a shared stub table, resulting in a potentially exploitable crash. This vulnerability affects Fi...

  • EPSS 0.13%
  • Veröffentlicht 22.10.2020 21:15:13
  • Zuletzt bearbeitet 21.11.2024 05:06:00

When a link to an external protocol was clicked, a prompt was presented that allowed the user to choose what application to open it in. An attacker could induce that prompt to be associated with an origin they didn't control, resulting in a spoofing ...

  • EPSS 1.57%
  • Veröffentlicht 22.10.2020 21:15:13
  • Zuletzt bearbeitet 21.11.2024 05:06:00

Mozilla developers and community members reported memory safety bugs present in Firefox 81 and Firefox ESR 78.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to...

  • EPSS 0.42%
  • Veröffentlicht 22.10.2020 21:15:13
  • Zuletzt bearbeitet 21.11.2024 05:06:00

Mozilla developers reported memory safety bugs present in Firefox 81. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability aff...

  • EPSS 0.07%
  • Veröffentlicht 08.10.2020 14:15:11
  • Zuletzt bearbeitet 21.11.2024 04:59:38

When converting coordinates from projective to affine, the modular inversion was not performed in constant time, resulting in a possible timing-based side channel attack. This vulnerability affects Firefox < 80 and Firefox for Android < 80.

  • EPSS 0.07%
  • Veröffentlicht 08.10.2020 14:15:11
  • Zuletzt bearbeitet 21.11.2024 04:59:38

During ECDSA signature generation, padding applied in the nonce designed to ensure constant-time scalar multiplication was removed, resulting in variable-time execution dependent on secret data. This vulnerability affects Firefox < 80 and Firefox for...