Mozilla

Firefox ESR

640 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.6%
  • Veröffentlicht 05.08.2021 20:15:08
  • Zuletzt bearbeitet 21.11.2024 06:02:05

Mozilla developers reported memory safety bugs present in code shared between Firefox and Thunderbird. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbit...

  • EPSS 0.88%
  • Veröffentlicht 24.06.2021 14:15:10
  • Zuletzt bearbeitet 21.11.2024 06:02:03

A transient execution vulnerability, named Floating Point Value Injection (FPVI) allowed an attacker to leak arbitrary memory addresses and may have also enabled JIT type confusion attacks. (A related vulnerability, Speculative Code Store Bypass (SCS...

  • EPSS 0.32%
  • Veröffentlicht 24.06.2021 14:15:10
  • Zuletzt bearbeitet 21.11.2024 06:02:04

A locally-installed hostile program could send `WM_COPYDATA` messages that Firefox would process incorrectly, leading to an out-of-bounds read. *This bug only affects Firefox on Windows. Other operating systems are unaffected.*. This vulnerability af...

  • EPSS 0.27%
  • Veröffentlicht 24.06.2021 14:15:10
  • Zuletzt bearbeitet 21.11.2024 06:02:04

Mozilla developers reported memory safety bugs present in Firefox 88 and Firefox ESR 78.11. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. ...

  • EPSS 0.38%
  • Veröffentlicht 24.06.2021 14:15:09
  • Zuletzt bearbeitet 21.11.2024 05:52:10

A WebGL framebuffer was not initialized early enough, resulting in memory corruption and an out of bound write. This vulnerability affects Firefox ESR < 78.10, Thunderbird < 78.10, and Firefox < 88.

  • EPSS 0.86%
  • Veröffentlicht 24.06.2021 14:15:09
  • Zuletzt bearbeitet 21.11.2024 05:52:10

When Responsive Design Mode was enabled, it used references to objects that were previously freed. We presume that with enough effort this could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 78.10, Thunderbird < ...

  • EPSS 0.17%
  • Veröffentlicht 24.06.2021 14:15:09
  • Zuletzt bearbeitet 21.11.2024 05:52:10

Through complicated navigations with new windows, an HTTP page could have inherited a secure lock icon from an HTTPS page. This vulnerability affects Firefox ESR < 78.10, Thunderbird < 78.10, and Firefox < 88.

Exploit
  • EPSS 0.21%
  • Veröffentlicht 24.06.2021 14:15:09
  • Zuletzt bearbeitet 21.11.2024 05:52:10

If a Blob URL was loaded through some unusual user interaction, it could have been loaded by the System Principal and granted additional privileges that should not be granted to web content. This vulnerability affects Firefox ESR < 78.10, Thunderbird...

  • EPSS 0.38%
  • Veröffentlicht 24.06.2021 14:15:09
  • Zuletzt bearbeitet 21.11.2024 05:52:11

When a user clicked on an FTP URL containing encoded newline characters (%0A and %0D), the newlines would have been interpreted as such and allowed arbitrary commands to be sent to the FTP server. This vulnerability affects Firefox ESR < 78.10, Thund...

  • EPSS 0.44%
  • Veröffentlicht 24.06.2021 14:15:09
  • Zuletzt bearbeitet 21.11.2024 06:02:02

The WebAssembly JIT could miscalculate the size of a return type, which could lead to a null read and result in a crash. *Note: This issue only affected x86-32 platforms. Other platforms are unaffected.*. This vulnerability affects Firefox ESR < 78.1...