Mozilla

Firefox

2939 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.16%
  • Veröffentlicht 09.07.2020 14:15:10
  • Zuletzt bearbeitet 21.11.2024 04:59:42

When constructing a permission prompt for WebRTC, a URI was supplied from the content process. This URI was untrusted, and could have been the URI of an origin that was previously granted permission; bypassing the prompt. This vulnerability affects F...

  • EPSS 1.5%
  • Veröffentlicht 26.05.2020 18:15:11
  • Zuletzt bearbeitet 21.11.2024 04:59:37

The Firefox content processes did not sufficiently lockdown access control which could result in a sandbox escape. *Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox ESR < 68.8 and Firefox < 76.

  • EPSS 0.55%
  • Veröffentlicht 26.05.2020 18:15:11
  • Zuletzt bearbeitet 21.11.2024 04:59:37

The Firefox content processes did not sufficiently lockdown access control which could result in a sandbox escape. *Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox ESR < 68.8 and Firefox < 76.

  • EPSS 1.47%
  • Veröffentlicht 26.05.2020 18:15:11
  • Zuletzt bearbeitet 21.11.2024 04:59:37

Incorrect origin serialization of URLs with IPv6 addresses could lead to incorrect security checks. This vulnerability affects Firefox < 76.

  • EPSS 0.7%
  • Veröffentlicht 26.05.2020 18:15:11
  • Zuletzt bearbeitet 21.11.2024 04:59:37

Documents formed using data: URLs in an OBJECT element failed to inherit the CSP of the creating context. This allowed the execution of scripts that should have been blocked, albeit with a unique opaque origin. This vulnerability affects Firefox < 76...

  • EPSS 0.14%
  • Veröffentlicht 26.05.2020 18:15:11
  • Zuletzt bearbeitet 21.11.2024 04:59:37

The 'Copy as cURL' feature of Devtools' network tab did not properly escape the HTTP POST data of a request, which can be controlled by the website. If a user used the 'Copy as cURL' feature and pasted the command into a terminal, it could have resul...

  • EPSS 0.32%
  • Veröffentlicht 26.05.2020 18:15:11
  • Zuletzt bearbeitet 21.11.2024 05:36:15

For native-to-JS bridging, the app requires a unique token to be passed that ensures non-app code can't call the bridging functions. That token was being used for JS-to-native also, but it isn't needed in this case, and its usage was also leaking thi...

  • EPSS 6.27%
  • Veröffentlicht 26.05.2020 18:15:11
  • Zuletzt bearbeitet 21.11.2024 05:36:15

A buffer overflow could occur when parsing and validating SCTP chunks in WebRTC. This could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0.

  • EPSS 1%
  • Veröffentlicht 26.05.2020 18:15:10
  • Zuletzt bearbeitet 21.11.2024 04:59:37

A race condition when running shutdown code for Web Worker led to a use-after-free vulnerability. This resulted in a potentially exploitable crash. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0.

  • EPSS 0.48%
  • Veröffentlicht 26.05.2020 17:15:10
  • Zuletzt bearbeitet 21.11.2024 04:59:37

The 'Copy as cURL' feature of Devtools' network tab did not properly escape the HTTP method of a request, which can be controlled by the website. If a user used the 'Copy as cURL' feature and pasted the command into a terminal, it could have resulted...