Mozilla

Firefox ESR

866 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Published 22.12.2022 20:15:25
  • Last modified 16.04.2025 14:15:20

Documents in deeply-nested cross-origin browsing contexts could have obtained permissions granted to the top-level origin, bypassing the existing prompt and wrongfully inheriting the top-level permissions. This vulnerability affects Thunderbird < 91....

  • EPSS 0.11%
  • Published 22.12.2022 20:15:25
  • Last modified 16.04.2025 14:15:21

An improper implementation of the new iframe sandbox keyword <code>allow-top-navigation-by-user-activation</code> could lead to script execution without <code>allow-scripts</code> being present. This vulnerability affects Thunderbird < 91.9, Firefox ...

Exploit
  • EPSS 0.13%
  • Published 22.12.2022 20:15:24
  • Last modified 16.04.2025 14:15:19

When generating the assembly code for <code>MLoadTypedArrayElementHole</code>, an incorrect AliasSet was used. In conjunction with another vulnerability this could have been used for an out of bounds memory read. This vulnerability affects Thunderbir...

Exploit
  • EPSS 0.14%
  • Published 22.12.2022 20:15:24
  • Last modified 16.04.2025 14:15:20

Due to a layout change, iframe contents could have been rendered outside of its border. This could have led to user confusion or spoofing attacks. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8.

Exploit
  • EPSS 8.66%
  • Published 22.12.2022 20:15:23
  • Last modified 15.04.2025 21:15:46

If a compromised content process sent an unexpected number of WebAuthN Extensions in a Register command to the parent process, an out of bounds write would have occurred leading to memory corruption and a potentially exploitable crash. This vulnerabi...

Exploit
  • EPSS 6.12%
  • Published 22.12.2022 20:15:23
  • Last modified 15.04.2025 20:15:35

By using a link with <code>rel="localization"</code> a use-after-free could have been triggered by destroying an object during JavaScript execution and then referencing the object through a freed pointer, leading to a potential exploitable crash. Thi...

Exploit
  • EPSS 0.09%
  • Published 22.12.2022 20:15:22
  • Last modified 15.04.2025 21:15:45

Previously Firefox for macOS and Linux would download temporary files to a user-specific directory in <code>/tmp</code>, but this behavior was changed to download them to <code>/tmp</code> where they could be affected by other local users. This behav...

Exploit
  • EPSS 0.1%
  • Published 22.12.2022 20:15:22
  • Last modified 15.04.2025 21:15:46

When installing an add-on, Firefox verified the signature before prompting the user; but while the user was confirming the prompt, the underlying add-on file could have been modified and Firefox would not have noticed. This vulnerability affects Fire...

Warning Exploit
  • EPSS 4.45%
  • Published 22.12.2022 20:15:22
  • Last modified 06.03.2025 19:48:51

Removing an XSLT parameter during processing could have lead to an exploitable use-after-free. We have had reports of attacks in the wild abusing this flaw. This vulnerability affects Firefox < 97.0.2, Firefox ESR < 91.6.1, Firefox for Android < 97.3...

Warning Exploit
  • EPSS 2.96%
  • Published 22.12.2022 20:15:22
  • Last modified 21.03.2025 21:09:05

An unexpected message in the WebGPU IPC framework could lead to a use-after-free and exploitable sandbox escape. We have had reports of attacks in the wild abusing this flaw. This vulnerability affects Firefox < 97.0.2, Firefox ESR < 91.6.1, Firefox ...