Mozilla

Firefox ESR

866 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.52%
  • Veröffentlicht 23.07.2019 14:15:13
  • Zuletzt bearbeitet 21.11.2024 04:21:36

A use-after-free vulnerability can occur when working with XMLHttpRequest (XHR) in an event loop, causing the XHR main thread to be called after it has been freed. This results in a potentially exploitable crash. This vulnerability affects Thunderbir...

  • EPSS 0.52%
  • Veröffentlicht 23.07.2019 14:15:13
  • Zuletzt bearbeitet 21.11.2024 04:21:36

A use-after-free vulnerability can occur when listeners are removed from the event listener manager while still in use, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.

Exploit
  • EPSS 70.88%
  • Veröffentlicht 26.04.2019 17:29:04
  • Zuletzt bearbeitet 21.11.2024 04:52:21

Incorrect alias information in IonMonkey JIT compiler for Array.prototype.slice method may lead to missing bounds check and a buffer overflow. This vulnerability affects Firefox < 66.0.1, Firefox ESR < 60.6.1, and Thunderbird < 60.6.1.

  • EPSS 51.92%
  • Veröffentlicht 26.04.2019 17:29:04
  • Zuletzt bearbeitet 21.11.2024 04:52:21

Incorrect handling of __proto__ mutations may lead to type confusion in IonMonkey JIT code and can be leveraged for arbitrary memory read and write. This vulnerability affects Firefox < 66.0.1, Firefox ESR < 60.6.1, and Thunderbird < 60.6.1.

  • EPSS 0.44%
  • Veröffentlicht 26.04.2019 17:29:02
  • Zuletzt bearbeitet 21.11.2024 04:52:19

A vulnerability was discovered where specific command line arguments are not properly discarded during Firefox invocation as a shell handler for URLs. This could be used to retrieve and execute files whose location is supplied through these command l...

  • EPSS 0.76%
  • Veröffentlicht 26.04.2019 17:29:02
  • Zuletzt bearbeitet 21.11.2024 04:52:19

A vulnerability where type-confusion in the IonMonkey just-in-time (JIT) compiler could potentially be used by malicious JavaScript to trigger a potentially exploitable crash. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Fir...

  • EPSS 0.76%
  • Veröffentlicht 26.04.2019 17:29:02
  • Zuletzt bearbeitet 21.11.2024 04:52:19

A use-after-free vulnerability can occur when the SMIL animation controller incorrectly registers with the refresh driver twice when only a single registration is expected. When a registration is later freed with the removal of the animation controll...

  • EPSS 0.39%
  • Veröffentlicht 26.04.2019 17:29:02
  • Zuletzt bearbeitet 21.11.2024 04:52:20

Firefox will accept any registered Program ID as an external protocol handler and offer to launch this local application when given a matching URL on Windows operating systems. This should only happen if the program has specifically registered itself...

  • EPSS 2.19%
  • Veröffentlicht 26.04.2019 17:29:01
  • Zuletzt bearbeitet 21.11.2024 04:52:18

Mozilla developers and community members reported memory safety bugs present in Firefox 65, Firefox ESR 60.5, and Thunderbird 60.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these coul...

  • EPSS 0.76%
  • Veröffentlicht 26.04.2019 17:29:01
  • Zuletzt bearbeitet 21.11.2024 04:52:18

A use-after-free vulnerability can occur when a raw pointer to a DOM element on a page is obtained using JavaScript and the element is then removed while still in use. This results in a potentially exploitable crash. This vulnerability affects Thunde...