Mozilla

Firefox ESR

866 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Published 29.04.2025 13:13:35
  • Last modified 09.05.2025 19:33:39

Modification of specific WebGL shader attributes could trigger an out-of-bounds read, which, when chained with other vulnerabilities, could be used to escalate privileges. *This bug only affects Thunderbird for macOS. Other versions of Thunderbird ar...

  • EPSS 0.07%
  • Published 29.04.2025 13:13:33
  • Last modified 13.06.2025 18:53:56

Thunderbird's update mechanism allowed a medium-integrity user process to interfere with the SYSTEM-level updater by manipulating the file-locking behavior. By injecting code into the user-privileged process, an attacker could bypass intended access ...

Exploit
  • EPSS 0.16%
  • Published 01.04.2025 13:15:41
  • Last modified 07.04.2025 13:31:38

JavaScript code running while transforming a document with the XSLTProcessor could lead to a use-after-free. This vulnerability affects Firefox < 137, Firefox ESR < 115.22, Firefox ESR < 128.9, Thunderbird < 137, and Thunderbird < 128.9.

  • EPSS 0.1%
  • Published 01.04.2025 13:15:41
  • Last modified 07.04.2025 13:31:33

A crafted URL containing specific Unicode characters could have hidden the true origin of the page, resulting in a potential spoofing attack. This vulnerability affects Firefox < 137, Firefox ESR < 128.9, Thunderbird < 137, and Thunderbird < 128.9.

  • EPSS 0.06%
  • Published 01.04.2025 13:15:41
  • Last modified 07.04.2025 13:31:26

Memory safety bugs present in Firefox 136, Thunderbird 136, Firefox ESR 128.8, and Thunderbird 128.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitr...

Media report
  • EPSS 0.06%
  • Published 27.03.2025 13:27:57
  • Last modified 01.05.2025 19:31:14

Following the recent Chrome sandbox escape (CVE-2025-2783), various Firefox developers identified a similar pattern in our IPC code. A compromised child process could cause the parent process to return an unintentionally powerful handle, leading to a...

  • EPSS 0.12%
  • Published 04.03.2025 14:15:38
  • Last modified 28.03.2025 20:09:58

An inconsistent comparator in xslt/txNodeSorter could have resulted in potentially exploitable out-of-bounds access. Only affected version 122 and later. This vulnerability affects Firefox < 136, Firefox ESR < 128.8, Thunderbird < 136, and Thunderbir...

  • EPSS 0.2%
  • Published 04.03.2025 14:15:38
  • Last modified 03.04.2025 13:29:37

On 64-bit CPUs, when the JIT compiles WASM i32 return values they can pick up bits from left over memory. This can potentially cause them to be treated as a different type. This vulnerability affects Firefox < 136, Firefox ESR < 115.21, Firefox ESR <...

  • EPSS 0.15%
  • Published 04.03.2025 14:15:38
  • Last modified 03.04.2025 13:29:50

It was possible to interrupt the processing of a RegExp bailout and run additional JavaScript, potentially triggering garbage collection when the engine was not expecting it. This vulnerability affects Firefox < 136, Firefox ESR < 128.8, Thunderbird ...

  • EPSS 0.08%
  • Published 04.03.2025 14:15:38
  • Last modified 03.04.2025 13:30:01

A web page could trick a user into setting that site as the default handler for a custom URL protocol. This vulnerability affects Firefox < 136, Firefox ESR < 128.8, Thunderbird < 136, and Thunderbird < 128.8.