Mozilla

Firefox ESR

866 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.85%
  • Veröffentlicht 08.01.2020 22:15:11
  • Zuletzt bearbeitet 21.11.2024 04:31:31

When using nested workers, a use-after-free could occur during worker destruction. This resulted in a potentially exploitable crash. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.

  • EPSS 0.14%
  • Veröffentlicht 08.01.2020 22:15:11
  • Zuletzt bearbeitet 21.11.2024 04:31:32

When running, the updater service wrote status and log files to an unrestricted location; potentially allowing an unprivileged process to locate and exploit a vulnerability in file handling in the updater service. *Note: This attack requires local sy...

Exploit
  • EPSS 1.33%
  • Veröffentlicht 08.01.2020 22:15:11
  • Zuletzt bearbeitet 21.11.2024 04:31:32

Under certain conditions, when checking the Resist Fingerprinting preference during device orientation checks, a race condition could have caused a use-after-free and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.3, Fir...

Exploit
  • EPSS 1.33%
  • Veröffentlicht 08.01.2020 22:15:11
  • Zuletzt bearbeitet 21.11.2024 04:31:32

Under certain conditions, when retrieving a document from a DocShell in the antitracking code, a race condition could cause a use-after-free condition and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 6...

Exploit
  • EPSS 0.98%
  • Veröffentlicht 08.01.2020 21:15:10
  • Zuletzt bearbeitet 21.11.2024 04:21:44

Mozilla developers and community members reported memory safety bugs present in Firefox 69 and Firefox ESR 68.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could be exploited to run ar...

  • EPSS 0.81%
  • Veröffentlicht 08.01.2020 20:15:12
  • Zuletzt bearbeitet 21.11.2024 04:21:42

When encrypting with a block cipher, if a call to NSC_EncryptUpdate was made with data smaller than the block size, a small out of bounds write could occur. This could have caused heap corruption and a potentially exploitable crash. This vulnerabilit...

  • EPSS 1.38%
  • Veröffentlicht 08.01.2020 20:15:12
  • Zuletzt bearbeitet 21.11.2024 04:21:43

When following the value's prototype chain, it was possible to retain a reference to a locale, delete it, and subsequently reference it. This resulted in a use-after-free and a potentially exploitable crash. This vulnerability affects Firefox < 70, T...

Exploit
  • EPSS 0.85%
  • Veröffentlicht 08.01.2020 20:15:12
  • Zuletzt bearbeitet 21.11.2024 04:21:44

Mozilla community member Philipp reported a memory safety bug present in Firefox 68 when 360 Total Security was installed. This bug showed evidence of memory corruption in the accessibility engine and we presume that with enough effort that it could ...

  • EPSS 3.06%
  • Veröffentlicht 08.01.2020 20:15:12
  • Zuletzt bearbeitet 21.11.2024 04:21:44

An attacker could have caused 4 bytes of HMAC output to be written past the end of a buffer stored on the stack. This could be used by an attacker to execute arbitrary code or more likely lead to a crash. This vulnerability affects Firefox < 70, Thun...

  • EPSS 1.52%
  • Veröffentlicht 08.01.2020 20:15:12
  • Zuletzt bearbeitet 21.11.2024 04:21:44

A fixed-size stack buffer could overflow in nrappkit when doing WebRTC signaling. This resulted in a potentially exploitable crash in some instances. This vulnerability affects Firefox < 70, Thunderbird < 68.2, and Firefox ESR < 68.2.