Mozilla

Firefox ESR

866 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.46%
  • Veröffentlicht 10.08.2020 18:15:12
  • Zuletzt bearbeitet 21.11.2024 05:05:57

When in an endless loop, a website specifying a custom cursor using CSS could make it look like the user is interacting with the user interface, when they are not. This could lead to a perceived broken state, especially when interactions with existin...

  • EPSS 0.23%
  • Veröffentlicht 10.08.2020 18:15:12
  • Zuletzt bearbeitet 21.11.2024 05:05:57

A redirected HTTP request which is observed or modified through a web extension could bypass existing CORS checks, leading to potential disclosure of cross-origin information. This vulnerability affects Firefox ESR < 78.1, Firefox < 79, and Thunderbi...

  • EPSS 0.84%
  • Veröffentlicht 10.08.2020 18:15:12
  • Zuletzt bearbeitet 21.11.2024 05:05:57

JIT optimizations involving the Javascript arguments object could confuse later optimizations. This risk was already mitigated by various precautions in the code, resulting in this bug rated at only moderate severity. This vulnerability affects Firef...

  • EPSS 0.2%
  • Veröffentlicht 10.08.2020 18:15:12
  • Zuletzt bearbeitet 21.11.2024 05:05:57

Firefox could be made to load attacker-supplied DLL files from the installation directory. This required an attacker that is already capable of placing files in the installation directory. *Note: This issue only affected Windows operating systems. Ot...

  • EPSS 0.49%
  • Veröffentlicht 10.08.2020 18:15:12
  • Zuletzt bearbeitet 21.11.2024 05:05:57

The code for downloading files did not properly take care of special characters, which led to an attacker being able to cut off the file ending at an earlier position, leading to a different file type being downloaded than shown in the dialog. This v...

  • EPSS 0.93%
  • Veröffentlicht 10.08.2020 18:15:12
  • Zuletzt bearbeitet 21.11.2024 05:05:57

Mozilla developers and community members reported memory safety bugs present in Firefox 78 and Firefox ESR 78.0. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to...

  • EPSS 1.67%
  • Veröffentlicht 09.07.2020 15:15:12
  • Zuletzt bearbeitet 21.11.2024 04:59:41

When performing add-on updates, certificate chains terminating in non-built-in-roots were rejected (even if they were legitimately added by an administrator.) This could have caused add-ons to become out-of-date silently without notification to the u...

  • EPSS 0.36%
  • Veröffentlicht 09.07.2020 15:15:11
  • Zuletzt bearbeitet 21.11.2024 04:59:39

Mozilla Developer Iain Ireland discovered a missing type check during unboxed objects removal, resulting in a crash. We presume that with enough effort that it could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 68.9.0,...

  • EPSS 0.84%
  • Veröffentlicht 09.07.2020 15:15:11
  • Zuletzt bearbeitet 21.11.2024 04:59:39

Mozilla developers reported memory safety bugs present in Firefox 76 and Firefox ESR 68.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. T...

Exploit
  • EPSS 0.43%
  • Veröffentlicht 09.07.2020 15:15:11
  • Zuletzt bearbeitet 21.11.2024 04:59:41

Due to confusion about ValueTags on JavaScript Objects, an object may pass through the type barrier, resulting in memory corruption and a potentially exploitable crash. *Note: this issue only affects Firefox on ARM64 platforms.* This vulnerability af...