Mozilla

Firefox ESR

866 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 39.3%
  • Veröffentlicht 26.04.2019 17:29:01
  • Zuletzt bearbeitet 21.11.2024 04:52:18

The type inference system allows the compilation of functions that can cause type confusions between arbitrary objects when compiled through the IonMonkey just-in-time (JIT) compiler and when the constructor function is entered through on-stack repla...

Exploit
  • EPSS 19.72%
  • Veröffentlicht 26.04.2019 17:29:01
  • Zuletzt bearbeitet 21.11.2024 04:52:19

The IonMonkey just-in-time (JIT) compiler can leak an internal JS_OPTIMIZED_OUT magic value to the running script during a bailout. This magic value can then be used by JavaScript to achieve memory corruption, which results in a potentially exploitab...

  • EPSS 0.31%
  • Veröffentlicht 26.04.2019 17:29:01
  • Zuletzt bearbeitet 21.11.2024 04:52:19

A mechanism was discovered that removes some bounds checking for string, array, or typed array accesses if Spectre mitigations have been disabled. This vulnerability could allow an attacker to create an arbitrary value in compiled JavaScript, for whi...

  • EPSS 5.06%
  • Veröffentlicht 28.02.2019 18:29:01
  • Zuletzt bearbeitet 21.11.2024 03:45:09

Mozilla developers and community members reported memory safety bugs present in Firefox 63 and Firefox ESR 60.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to r...

  • EPSS 25.96%
  • Veröffentlicht 28.02.2019 18:29:01
  • Zuletzt bearbeitet 21.11.2024 03:56:02

A use-after-free vulnerability can occur after deleting a selection element due to a weak reference to the select element in the options collection. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.4, Firef...

  • EPSS 10.45%
  • Veröffentlicht 28.02.2019 18:29:01
  • Zuletzt bearbeitet 21.11.2024 03:56:02

A buffer overflow can occur in the Skia library during buffer offset calculations with hardware accelerated canvas 2D actions due to the use of 32-bit calculations instead of 64-bit. This results in a potentially exploitable crash. This vulnerability...

  • EPSS 2.15%
  • Veröffentlicht 28.02.2019 18:29:01
  • Zuletzt bearbeitet 21.11.2024 03:56:02

A same-origin policy violation allowing the theft of cross-origin URL entries when using the Javascript location property to cause a redirection to another site using performance.getEntries(). This is a same-origin policy violation and could allow fo...

  • EPSS 3.79%
  • Veröffentlicht 28.02.2019 18:29:01
  • Zuletzt bearbeitet 21.11.2024 03:56:03

A potential vulnerability leading to an integer overflow can occur during buffer size calculations for images when a raw value is used instead of the checked value. This leads to a possible out-of-bounds write. This vulnerability affects Thunderbird ...

  • EPSS 0.1%
  • Veröffentlicht 28.02.2019 18:29:01
  • Zuletzt bearbeitet 21.11.2024 03:56:03

A same-origin policy violation allowing the theft of cross-origin URL entries when using a meta http-equiv="refresh" on a page to cause a redirection to another site using performance.getEntries(). This is a same-origin policy violation and could all...

  • EPSS 1.83%
  • Veröffentlicht 28.02.2019 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:45:07

Mozilla developers and community members reported memory safety bugs present in Firefox ESR 60.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary co...