Search CVE reports
121 – 130 of 2200 results
Some fixes available 1 of 12
Script elements loading cross-origin resources generated load and error events which leaked information enabling XS-Leaks attacks. This vulnerability affects Firefox < 139, Firefox ESR < 128.11, Thunderbird < 139, and Thunderbird < 128.11.
9 affected packages
mozjs78, firefox, thunderbird, mozjs38, mozjs52...
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| mozjs78 | Not in release | Ignored | Not in release | — |
| firefox | Not affected | Not affected | Not in release | — |
| thunderbird | Not affected | Fixed | Not in release | — |
| mozjs38 | Not in release | Not in release | Not in release | Needs evaluation |
| mozjs52 | Not in release | Not in release | Ignored | Ignored |
| mozjs68 | Not in release | Not in release | Ignored | — |
| mozjs91 | Not in release | Ignored | Not in release | — |
| mozjs102 | Ignored | Ignored | Not in release | — |
| mozjs115 | Ignored | Not in release | Not in release | — |
Some fixes available 1 of 12
Due to insufficient escaping of the ampersand character in the “Copy as cURL” feature, an attacker could trick a user into using this command, potentially leading to local code execution on the user's system. *This bug only...
9 affected packages
mozjs52, firefox, thunderbird, mozjs38, mozjs68...
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| mozjs52 | Not in release | Not in release | Ignored | Ignored |
| firefox | Not affected | Not affected | Not in release | — |
| thunderbird | Not affected | Fixed | Not in release | — |
| mozjs38 | Not in release | Not in release | Not in release | Needs evaluation |
| mozjs68 | Not in release | Not in release | Ignored | — |
| mozjs78 | Not in release | Ignored | Not in release | — |
| mozjs91 | Not in release | Ignored | Not in release | — |
| mozjs102 | Ignored | Ignored | Not in release | — |
| mozjs115 | Ignored | Not in release | Not in release | — |
Some fixes available 1 of 12
Due to insufficient escaping of the newline character in the “Copy as cURL” feature, an attacker could trick a user into using this command, potentially leading to local code execution on the user's system. This vulnerability...
9 affected packages
firefox, thunderbird, mozjs38, mozjs52, mozjs68...
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| firefox | Not affected | Not affected | Not in release | — |
| thunderbird | Not affected | Fixed | Not in release | — |
| mozjs38 | Not in release | Not in release | Not in release | Needs evaluation |
| mozjs52 | Not in release | Not in release | Ignored | Ignored |
| mozjs68 | Not in release | Not in release | Ignored | — |
| mozjs78 | Not in release | Ignored | Not in release | — |
| mozjs91 | Not in release | Ignored | Not in release | — |
| mozjs102 | Ignored | Ignored | Not in release | — |
| mozjs115 | Ignored | Not in release | Not in release | — |
Some fixes available 1 of 12
Error handling for script execution was incorrectly isolated from web content, which could have allowed cross-origin leak attacks. This vulnerability affects Firefox < 139, Firefox ESR < 115.24, Firefox ESR < 128.11, Thunderbird <...
9 affected packages
firefox, thunderbird, mozjs38, mozjs52, mozjs68...
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| firefox | Not affected | Not affected | Not in release | — |
| thunderbird | Not affected | Fixed | Not in release | — |
| mozjs38 | Not in release | Not in release | Not in release | Needs evaluation |
| mozjs52 | Not in release | Not in release | Ignored | Ignored |
| mozjs68 | Not in release | Not in release | Ignored | — |
| mozjs78 | Not in release | Ignored | Not in release | — |
| mozjs91 | Not in release | Ignored | Not in release | — |
| mozjs102 | Ignored | Ignored | Not in release | — |
| mozjs115 | Ignored | Not in release | Not in release | — |
A double-free could have occurred in `vpx_codec_enc_init_multi` after a failed allocation when initializing the encoder for WebRTC. This could have caused memory corruption and a potentially exploitable crash. This vulnerability...
9 affected packages
firefox, thunderbird, mozjs38, mozjs52, mozjs68...
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| firefox | Not affected | Not affected | Not in release | — |
| thunderbird | Not affected | Not affected | Not in release | — |
| mozjs38 | Not in release | Not in release | Not in release | Not affected |
| mozjs52 | Not in release | Not in release | Ignored | Ignored |
| mozjs68 | Not in release | Not in release | Ignored | — |
| mozjs78 | Not in release | Ignored | Not in release | — |
| mozjs91 | Not in release | Ignored | Not in release | — |
| mozjs102 | Ignored | Ignored | Not in release | — |
| mozjs115 | Ignored | Not in release | Not in release | — |
Opening maliciously-crafted URLs in Firefox from other apps such as Safari could have allowed attackers to spoof website addresses if the URLs utilized non-HTTP schemes used internally by the Firefox iOS client This vulnerability...
2 affected packages
firefox, thunderbird
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| firefox | Not affected | Not affected | Not in release | — |
| thunderbird | Not affected | Not affected | Not in release | — |
Some fixes available 1 of 12
An attacker was able to perform an out-of-bounds read or write on a JavaScript object by confusing array index sizes. This vulnerability affects Firefox < 138.0.4, Firefox ESR < 128.10.1, Firefox ESR < 115.23.1, Thunderbird <...
9 affected packages
firefox, thunderbird, mozjs38, mozjs52, mozjs68...
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| firefox | Not affected | Not affected | Not in release | — |
| thunderbird | Not affected | Fixed | Not in release | — |
| mozjs38 | Not in release | Not in release | Not in release | Needs evaluation |
| mozjs52 | Not in release | Not in release | Needs evaluation | Ignored |
| mozjs68 | Not in release | Not in release | Ignored | — |
| mozjs78 | Not in release | Ignored | Not in release | — |
| mozjs91 | Not in release | Ignored | Not in release | — |
| mozjs102 | Ignored | Ignored | Not in release | — |
| mozjs115 | Ignored | Not in release | Not in release | — |
Some fixes available 1 of 12
An attacker was able to perform an out-of-bounds read or write on a JavaScript `Promise` object. This vulnerability affects Firefox < 138.0.4, Firefox ESR < 128.10.1, Firefox ESR < 115.23.1, Thunderbird < 128.10.2, and Thunderbird...
9 affected packages
firefox, thunderbird, mozjs38, mozjs52, mozjs68...
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| firefox | Not affected | Not affected | Not in release | — |
| thunderbird | Not affected | Fixed | Not in release | — |
| mozjs38 | Not in release | Not in release | Not in release | Needs evaluation |
| mozjs52 | Not in release | Not in release | Needs evaluation | Ignored |
| mozjs68 | Not in release | Not in release | Ignored | — |
| mozjs78 | Not in release | Ignored | Not in release | — |
| mozjs91 | Not in release | Ignored | Not in release | — |
| mozjs102 | Ignored | Ignored | Not in release | — |
| mozjs115 | Ignored | Not in release | Not in release | — |
Some fixes available 1 of 2
It was possible to craft an email that showed a tracking link as an attachment. If the user attempted to open the attachment, Thunderbird automatically accessed the link. The configuration to block remote content did not prevent...
1 affected package
thunderbird
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| thunderbird | Not affected | Fixed | Not in release | — |
Some fixes available 1 of 2
Thunderbird's handling of the X-Mozilla-External-Attachment-URL header can be exploited to execute JavaScript in the file:/// context. By crafting a nested email attachment (message/rfc822) and setting its content type...
1 affected package
thunderbird
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| thunderbird | Not affected | Fixed | Not in release | — |