Mozilla

Firefox ESR

652 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.33%
  • Veröffentlicht 22.12.2022 20:15:25
  • Zuletzt bearbeitet 16.04.2025 14:15:21

An improper implementation of the new iframe sandbox keyword <code>allow-top-navigation-by-user-activation</code> could lead to script execution without <code>allow-scripts</code> being present. This vulnerability affects Thunderbird < 91.9, Firefox ...

Exploit
  • EPSS 0.26%
  • Veröffentlicht 22.12.2022 20:15:24
  • Zuletzt bearbeitet 16.04.2025 14:15:19

When generating the assembly code for <code>MLoadTypedArrayElementHole</code>, an incorrect AliasSet was used. In conjunction with another vulnerability this could have been used for an out of bounds memory read. This vulnerability affects Thunderbir...

Exploit
  • EPSS 0.19%
  • Veröffentlicht 22.12.2022 20:15:24
  • Zuletzt bearbeitet 16.04.2025 14:15:20

Due to a layout change, iframe contents could have been rendered outside of its border. This could have led to user confusion or spoofing attacks. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8.

Exploit
  • EPSS 13.84%
  • Veröffentlicht 22.12.2022 20:15:23
  • Zuletzt bearbeitet 15.04.2025 21:15:46

If a compromised content process sent an unexpected number of WebAuthN Extensions in a Register command to the parent process, an out of bounds write would have occurred leading to memory corruption and a potentially exploitable crash. This vulnerabi...

Exploit
  • EPSS 9.21%
  • Veröffentlicht 22.12.2022 20:15:23
  • Zuletzt bearbeitet 15.04.2025 20:15:35

By using a link with <code>rel="localization"</code> a use-after-free could have been triggered by destroying an object during JavaScript execution and then referencing the object through a freed pointer, leading to a potential exploitable crash. Thi...

Exploit
  • EPSS 0.1%
  • Veröffentlicht 22.12.2022 20:15:22
  • Zuletzt bearbeitet 15.04.2025 21:15:45

Previously Firefox for macOS and Linux would download temporary files to a user-specific directory in <code>/tmp</code>, but this behavior was changed to download them to <code>/tmp</code> where they could be affected by other local users. This behav...

Exploit
  • EPSS 0.11%
  • Veröffentlicht 22.12.2022 20:15:22
  • Zuletzt bearbeitet 15.04.2025 21:15:46

When installing an add-on, Firefox verified the signature before prompting the user; but while the user was confirming the prompt, the underlying add-on file could have been modified and Firefox would not have noticed. This vulnerability affects Fire...

  • EPSS 0.26%
  • Veröffentlicht 22.12.2022 20:15:21
  • Zuletzt bearbeitet 16.04.2025 15:15:51

When resizing a popup after requesting fullscreen access, the popup would not display the fullscreen notification. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.

Exploit
  • EPSS 0.12%
  • Veröffentlicht 22.12.2022 20:15:21
  • Zuletzt bearbeitet 16.04.2025 15:15:51

If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. Thi...

  • EPSS 0.28%
  • Veröffentlicht 22.12.2022 20:15:20
  • Zuletzt bearbeitet 16.04.2025 15:15:49

Web-accessible extension pages (pages with a moz-extension:// scheme) were not correctly enforcing the frame-ancestors directive when it was used in the Web Extension's Content Security Policy. This vulnerability affects Firefox < 97, Thunderbird < 9...