Mozilla

Firefox ESR

866 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.69%
  • Veröffentlicht 11.06.2018 21:29:09
  • Zuletzt bearbeitet 21.11.2024 03:32:41

The destructor function for the "WindowsDllDetourPatcher" class can be re-purposed by malicious code in concert with another vulnerability to write arbitrary data to an attacker controlled location in memory. This can be used to bypass existing memor...

  • EPSS 1.97%
  • Veröffentlicht 11.06.2018 21:29:08
  • Zuletzt bearbeitet 21.11.2024 03:32:35

A use-after-free and use-after-scope vulnerability when logging errors from headers for XML HTTP Requests (XHR). This could result in a potentially exploitable crash. This vulnerability affects Firefox < 54, Firefox ESR < 52.2, and Thunderbird < 52.2...

  • EPSS 1.97%
  • Veröffentlicht 11.06.2018 21:29:08
  • Zuletzt bearbeitet 21.11.2024 03:32:36

A use-after-free vulnerability in IndexedDB when one of its objects is destroyed in memory while a method on it is still being executed. This results in a potentially exploitable crash. This vulnerability affects Firefox < 54, Firefox ESR < 52.2, and...

Exploit
  • EPSS 1.77%
  • Veröffentlicht 11.06.2018 21:29:08
  • Zuletzt bearbeitet 21.11.2024 03:32:36

An out-of-bounds read vulnerability with the Opus encoder when the number of channels in an audio stream changes while the encoder is in use. This vulnerability affects Firefox < 54, Firefox ESR < 52.2, and Thunderbird < 52.2.

Exploit
  • EPSS 0.14%
  • Veröffentlicht 11.06.2018 21:29:08
  • Zuletzt bearbeitet 21.11.2024 03:32:36

The Mozilla Windows updater modifies some files to be updated by reading the original file and applying changes to it. The location of the original file can be altered by a malicious user by passing a special path to the callback parameter through th...

  • EPSS 0.09%
  • Veröffentlicht 11.06.2018 21:29:08
  • Zuletzt bearbeitet 21.11.2024 03:32:36

The Mozilla Maintenance Service "helper.exe" application creates a temporary directory writable by non-privileged users. When this is combined with creation of a junction (a form of symbolic link), protected files in the target directory of the junct...

  • EPSS 0.51%
  • Veröffentlicht 11.06.2018 21:29:08
  • Zuletzt bearbeitet 21.11.2024 03:32:36

Default fonts on OS X display some Tibetan characters as whitespace. When used in the addressbar as part of an IDN this can be used for domain name spoofing attacks. Note: This attack only affects OS X operating systems. Other operating systems are u...

Exploit
  • EPSS 1.04%
  • Veröffentlicht 11.06.2018 21:29:08
  • Zuletzt bearbeitet 21.11.2024 03:32:36

Characters from the "Canadian Syllabics" unicode block can be mixed with characters from other unicode blocks in the addressbar instead of being rendered as their raw "punycode" form, allowing for domain name spoofing attacks through character confus...

  • EPSS 0.49%
  • Veröffentlicht 11.06.2018 21:29:08
  • Zuletzt bearbeitet 21.11.2024 03:32:37

The "Mark of the Web" was not correctly saved on Windows when files with very long names were downloaded from the Internet. Without the Mark of the Web data, the security warning that Windows displays before running executables downloaded from the In...

  • EPSS 0.2%
  • Veröffentlicht 11.06.2018 21:29:08
  • Zuletzt bearbeitet 21.11.2024 03:32:37

An attack using manipulation of "updater.ini" contents, used by the Mozilla Windows Updater, and privilege escalation through the Mozilla Maintenance Service to allow for arbitrary file execution and deletion by the Maintenance Service, which has pri...