Mozilla

Firefox ESR

755 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.34%
  • Veröffentlicht 04.03.2025 14:15:38
  • Zuletzt bearbeitet 13.04.2026 15:16:52

It was possible to interrupt the processing of a RegExp bailout and run additional JavaScript, potentially triggering garbage collection when the engine was not expecting it. This vulnerability was fixed in Firefox 136, Firefox ESR 128.8, Thunderbird...

  • EPSS 0.23%
  • Veröffentlicht 04.03.2025 14:15:38
  • Zuletzt bearbeitet 13.04.2026 15:16:52

A web page could trick a user into setting that site as the default handler for a custom URL protocol. This vulnerability was fixed in Firefox 136, Firefox ESR 128.8, Thunderbird 136, and Thunderbird 128.8.

  • EPSS 0.18%
  • Veröffentlicht 04.03.2025 14:15:38
  • Zuletzt bearbeitet 13.04.2026 15:16:52

jar: URLs retrieve local file content packaged in a ZIP archive. The null and everything after it was ignored when retrieving the content from the archive, but the fake extension after the null was used to determine the type of content. This could ha...

Exploit
  • EPSS 0.26%
  • Veröffentlicht 04.03.2025 14:15:38
  • Zuletzt bearbeitet 13.04.2026 15:16:53

Memory safety bugs present in Firefox 135, Thunderbird 135, Firefox ESR 115.20, Firefox ESR 128.7, and Thunderbird 128.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exp...

  • EPSS 0.31%
  • Veröffentlicht 04.03.2025 14:15:38
  • Zuletzt bearbeitet 13.04.2026 15:16:53

Memory safety bugs present in Firefox 135, Thunderbird 135, Firefox ESR 128.7, and Thunderbird 128.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitr...

  • EPSS 0.34%
  • Veröffentlicht 04.03.2025 14:15:37
  • Zuletzt bearbeitet 13.04.2026 15:16:51

On Windows, a compromised content process could use bad StreamData sent over AudioIPC to trigger a use-after-free in the Browser process. This could have led to a sandbox escape. This vulnerability was fixed in Firefox 136, Firefox ESR 115.21, Firefo...

  • EPSS 0.39%
  • Veröffentlicht 04.03.2025 14:15:37
  • Zuletzt bearbeitet 13.04.2026 15:16:51

It was possible to cause a use-after-free in the content process side of a WebTransport connection, leading to a potentially exploitable crash. This vulnerability was fixed in Firefox 136, Firefox ESR 115.21, Firefox ESR 128.8, Thunderbird 136, and T...

  • EPSS 0.25%
  • Veröffentlicht 04.02.2025 14:15:32
  • Zuletzt bearbeitet 13.04.2026 15:16:49

A race condition could have led to private browsing tabs being opened in normal browsing windows. This could have resulted in a potential privacy leak. This vulnerability was fixed in Firefox 135, Firefox ESR 128.7, Thunderbird 128.7, and Thunderbird...

  • EPSS 0.12%
  • Veröffentlicht 07.01.2025 16:15:38
  • Zuletzt bearbeitet 13.04.2026 15:16:32

The WebChannel API, which is used to transport various information across processes, did not check the sending principal but rather accepted the principal being sent. This could have led to privilege escalation attacks. This vulnerability was fixed i...

  • EPSS 0.12%
  • Veröffentlicht 07.01.2025 16:15:38
  • Zuletzt bearbeitet 13.04.2026 15:16:32

Assuming a controlled failed memory allocation, an attacker could have caused a use-after-free, leading to a potentially exploitable crash. This vulnerability was fixed in Firefox 134, Firefox ESR 128.6, Firefox ESR 115.19, Thunderbird 134, and Thund...