Mozilla

Firefox ESR

866 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.2%
  • Published 26.11.2024 14:15:18
  • Last modified 03.04.2025 13:31:37

An attacker could cause a select dropdown to be shown over another tab; this could have led to user confusion and possible spoofing attacks. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thunderbird < 128.5.

  • EPSS 0.63%
  • Published 26.11.2024 14:15:18
  • Last modified 03.04.2025 13:31:28

The executable file warning was not presented when downloading .library-ms files. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.* This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thu...

  • EPSS 0.41%
  • Published 26.11.2024 14:15:18
  • Last modified 13.12.2024 17:15:05

Enhanced Tracking Protection's Strict mode may have inadvertently allowed a CSP `frame-src` bypass and DOM-based XSS through the Google SafeFrame shim in the Web Compatibility extension. This issue could have exposed users to malicious frames masquer...

  • EPSS 0.32%
  • Published 01.10.2024 16:15:11
  • Last modified 04.04.2025 14:38:55

A potential memory corruption vulnerability could be triggered if an attacker had the ability to trigger an OOM at a specific moment during JIT compilation. This vulnerability affects Firefox < 131, Firefox ESR < 128.3, Thunderbird < 128.3, and Thund...

  • EPSS 0.8%
  • Published 01.10.2024 16:15:11
  • Last modified 04.04.2025 14:38:37

Memory safety bugs present in Firefox 130, Firefox ESR 115.15, Firefox ESR 128.2, and Thunderbird 128.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arb...

  • EPSS 0.65%
  • Published 01.10.2024 16:15:11
  • Last modified 04.04.2025 14:38:30

Memory safety bugs present in Firefox 130, Firefox ESR 128.2, and Thunderbird 128.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vu...

  • EPSS 0.28%
  • Published 01.10.2024 16:15:10
  • Last modified 04.04.2025 14:39:18

A compromised content process could have allowed for the arbitrary loading of cross-origin pages. This vulnerability affects Firefox < 131, Firefox ESR < 128.3, Firefox ESR < 115.16, Thunderbird < 128.3, and Thunderbird < 131.

  • EPSS 0.15%
  • Published 01.10.2024 16:15:10
  • Last modified 14.03.2025 16:15:39

An attacker could, via a specially crafted multipart response, execute arbitrary JavaScript under the `resource://pdf.js` origin. This could allow them to access cross-origin PDF content. This access is limited to "same site" documents by the Site I...

  • EPSS 0.21%
  • Published 01.10.2024 16:15:10
  • Last modified 14.03.2025 16:15:39

An attacker could, via a specially crafted multipart response, execute arbitrary JavaScript under the `resource://devtools` origin. This could allow them to access cross-origin JSON content. This access is limited to "same site" documents by the Sit...

  • EPSS 0.32%
  • Published 01.10.2024 16:15:10
  • Last modified 04.04.2025 14:39:01

It is currently unknown if this issue is exploitable but a condition may arise where the structured clone of certain objects could lead to memory corruption. This vulnerability affects Firefox < 131, Firefox ESR < 128.3, Thunderbird < 128.3, and Thun...