Mozilla

Firefox ESR

866 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 2.03%
  • Veröffentlicht 11.06.2018 21:29:02
  • Zuletzt bearbeitet 21.11.2024 03:27:28

Use-after-free while manipulating XSL in XSLT documents. This vulnerability affects Thunderbird < 45.7, Firefox ESR < 45.7, and Firefox < 51.

Exploit
  • EPSS 1.8%
  • Veröffentlicht 11.06.2018 21:29:02
  • Zuletzt bearbeitet 21.11.2024 03:27:29

Hashed codes of JavaScript objects are shared between pages. This allows for pointer leaks because an object's address can be discovered through hash codes, and also allows for data leakage of an object's content using these hash codes. This vulnerab...

  • EPSS 0.27%
  • Veröffentlicht 11.06.2018 21:29:01
  • Zuletzt bearbeitet 21.11.2024 03:00:31

Add-on updates failed to verify that the add-on ID inside the signed package matched the ID of the add-on being updated. An attacker who could perform a man-in-the-middle attack on the user's connection to the update server and defeat the certificate...

  • EPSS 20.61%
  • Veröffentlicht 11.06.2018 21:29:01
  • Zuletzt bearbeitet 21.11.2024 03:00:31

A buffer overflow resulting in a potentially exploitable crash due to memory allocation issues when handling large amounts of incoming data. This vulnerability affects Thunderbird < 45.5, Firefox ESR < 45.5, and Firefox < 50.

  • EPSS 1.29%
  • Veröffentlicht 11.06.2018 21:29:01
  • Zuletzt bearbeitet 21.11.2024 03:00:32

An existing mitigation of timing side-channel attacks is insufficient in some circumstances. This issue is addressed in Network Security Services (NSS) 3.26.1. This vulnerability affects Thunderbird < 45.5, Firefox ESR < 45.5, and Firefox < 50.

  • EPSS 2.82%
  • Veröffentlicht 11.06.2018 21:29:01
  • Zuletzt bearbeitet 21.11.2024 03:01:57

Memory safety bugs were reported in Thunderbird 45.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 50....

Exploit
  • EPSS 0.71%
  • Veröffentlicht 11.06.2018 21:29:01
  • Zuletzt bearbeitet 21.11.2024 03:01:57

Event handlers on "marquee" elements were executed despite a strict Content Security Policy (CSP) that disallowed inline JavaScript. This vulnerability affects Firefox < 50.1, Firefox ESR < 45.6, and Thunderbird < 45.6.

  • EPSS 1.97%
  • Veröffentlicht 11.06.2018 21:29:00
  • Zuletzt bearbeitet 21.11.2024 02:54:00

Memory safety bugs were reported in Firefox 49 and Firefox ESR 45.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affect...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 11.06.2018 21:29:00
  • Zuletzt bearbeitet 21.11.2024 02:54:00

A same-origin policy bypass with local shortcut files to load arbitrary local content from disk. This vulnerability affects Thunderbird < 45.5, Firefox ESR < 45.5, and Firefox < 50.

  • EPSS 0.07%
  • Veröffentlicht 11.06.2018 21:29:00
  • Zuletzt bearbeitet 21.11.2024 02:54:00

When the Mozilla Updater is run, if the Updater's log file in the working directory points to a hardlink, data can be appended to an arbitrary local file. This vulnerability requires local system access. Note: this issue only affects Windows operatin...