Mozilla

Firefox ESR

640 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.07%
  • Veröffentlicht 22.07.2025 20:49:25
  • Zuletzt bearbeitet 03.11.2025 18:17:02

Thunderbird cached CORS preflight responses across IP address changes. This allowed circumventing CORS with DNS rebinding. This vulnerability affects Firefox < 141, Firefox ESR < 140.1, Thunderbird < 141, and Thunderbird < 140.1.

  • EPSS 0.02%
  • Veröffentlicht 22.07.2025 20:49:25
  • Zuletzt bearbeitet 28.07.2025 18:51:21

Setting a nameless cookie with an equals sign in the value shadowed other cookies. Even if the nameless cookie was set over HTTP and the shadowed cookie included the `Secure` attribute. This vulnerability affects Firefox < 141, Firefox ESR < 140.1, T...

  • EPSS 0.09%
  • Veröffentlicht 22.07.2025 20:49:24
  • Zuletzt bearbeitet 03.11.2025 20:19:21

On 64-bit platforms IonMonkey-JIT only wrote 32 bits of the 64-bit return value space on the stack. Baseline-JIT, however, read the entire 64 bits. This vulnerability affects Firefox < 141, Firefox ESR < 115.26, Firefox ESR < 128.13, Firefox ESR < 14...

  • EPSS 0.13%
  • Veröffentlicht 22.07.2025 20:49:24
  • Zuletzt bearbeitet 03.11.2025 20:19:21

On arm64, a WASM `br_table` instruction with a lot of entries could lead to the label being too far from the instruction causing truncation and incorrect computation of the branch address. This vulnerability affects Firefox < 141, Firefox ESR < 115.2...

  • EPSS 0.07%
  • Veröffentlicht 22.07.2025 20:49:24
  • Zuletzt bearbeitet 03.11.2025 20:19:21

Thunderbird executed `javascript:` URLs when used in `object` and `embed` tags. This vulnerability affects Firefox < 141, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.

  • EPSS 0.05%
  • Veröffentlicht 24.06.2025 12:28:01
  • Zuletzt bearbeitet 03.11.2025 20:19:19

When a file download is specified via the `Content-Disposition` header, that directive would be ignored if the file was included via a `<embed>` or `<object>` tag, potentially making a website vulnerable to a cross-site scripting attack. ...

  • EPSS 0.03%
  • Veröffentlicht 24.06.2025 12:28:00
  • Zuletzt bearbeitet 14.07.2025 19:15:33

The executable file warning did not warn users before opening files with the `terminal` extension. *This bug only affects Firefox for macOS. Other versions of Firefox are unaffected.* This vulnerability affects Firefox < 140, Firefox ESR < 128.12, T...

  • EPSS 0.06%
  • Veröffentlicht 24.06.2025 12:28:00
  • Zuletzt bearbeitet 03.11.2025 20:19:19

Firefox could have incorrectly parsed a URL and rewritten it to the youtube.com domain when parsing the URL specified in an `embed` tag. This could have bypassed website security checks that restricted which domains users were allowed to embed. This...

  • EPSS 0.16%
  • Veröffentlicht 24.06.2025 12:27:59
  • Zuletzt bearbeitet 03.11.2025 20:19:18

A use-after-free in FontFaceSet resulted in a potentially exploitable crash. This vulnerability affects Firefox < 140, Firefox ESR < 115.25, Firefox ESR < 128.12, Thunderbird < 140, and Thunderbird < 128.12.

  • EPSS 0.05%
  • Veröffentlicht 24.06.2025 12:27:59
  • Zuletzt bearbeitet 03.11.2025 20:19:18

An attacker who enumerated resources from the WebCompat extension could have obtained a persistent UUID that identified the browser, and persisted between containers and normal/private browsing mode, but not profiles. This vulnerability affects Firef...