Mozilla

Firefox ESR

640 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.27%
  • Veröffentlicht 02.03.2020 05:15:13
  • Zuletzt bearbeitet 21.11.2024 05:36:12

If a template tag was used in a select tag, the parser could be confused and allow JavaScript parsing and execution when it should not be allowed. A site that relied on the browser behaving correctly could suffer a cross-site scripting vulnerability ...

  • EPSS 0.47%
  • Veröffentlicht 02.03.2020 05:15:13
  • Zuletzt bearbeitet 21.11.2024 05:36:12

Command line arguments could have been injected during Firefox invocation as a shell handler for certain unsupported file types. This required Firefox to be configured as the default handler for a given file type and for a file downloaded to be opene...

  • EPSS 0.96%
  • Veröffentlicht 02.03.2020 05:15:13
  • Zuletzt bearbeitet 21.11.2024 05:36:12

Mozilla developers and community members reported memory safety bugs present in Firefox 72 and Firefox ESR 68.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to...

  • EPSS 2.15%
  • Veröffentlicht 08.01.2020 22:15:12
  • Zuletzt bearbeitet 21.11.2024 04:31:32

Mozilla developers reported memory safety bugs present in Firefox 70 and Firefox ESR 68.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. T...

  • EPSS 0.93%
  • Veröffentlicht 08.01.2020 22:15:12
  • Zuletzt bearbeitet 21.11.2024 04:31:32

During the initialization of a new content process, a pointer offset can be manipulated leading to memory corruption and a potentially exploitable crash in the parent process. *Note: this issue only occurs on Windows. Other operating systems are unaf...

  • EPSS 3.47%
  • Veröffentlicht 08.01.2020 22:15:12
  • Zuletzt bearbeitet 21.11.2024 04:31:32

When pasting a <style> tag from the clipboard into a rich text editor, the CSS sanitizer incorrectly rewrites a @namespace rule. This could allow for injection into certain types of websites resulting in data exfiltration. This vulnerability af...

  • EPSS 2.63%
  • Veröffentlicht 08.01.2020 22:15:12
  • Zuletzt bearbeitet 21.11.2024 04:31:33

Due to a missing case handling object types, a type confusion vulnerability could occur, resulting in a crash. We presume that with enough effort that it could be exploited to run arbitrary code. This vulnerability affects Firefox ESR < 68.4 and Fire...

Exploit
  • EPSS 0.47%
  • Veröffentlicht 08.01.2020 22:15:12
  • Zuletzt bearbeitet 21.11.2024 04:31:33

During the initialization of a new content process, a race condition occurs that can allow a content process to disclose heap addresses from the parent process. *Note: this issue only occurs on Windows. Other operating systems are unaffected.*. This ...

  • EPSS 4.63%
  • Veröffentlicht 08.01.2020 22:15:12
  • Zuletzt bearbeitet 21.11.2024 04:31:33

When pasting a <style> tag from the clipboard into a rich text editor, the CSS sanitizer does not escape < and > characters. Because the resulting string is pasted directly into the text node of the element this does not result in a direc...

Exploit
  • EPSS 3.28%
  • Veröffentlicht 08.01.2020 22:15:12
  • Zuletzt bearbeitet 21.11.2024 04:31:34

Mozilla developers reported memory safety bugs present in Firefox 71 and Firefox ESR 68.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. T...