Search CVE reports
151 – 160 of 2874 results
Some fixes available 2 of 13
An attacker could have caused a use-after-free via the Custom Highlight API, leading to a potentially exploitable crash. This vulnerability affects Firefox < 135, Firefox ESR < 115.20, Firefox ESR < 128.7, Thunderbird < 128.7, and...
9 affected packages
mozjs78, firefox, thunderbird, mozjs38, mozjs52...
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| mozjs78 | Not in release | Ignored | Not in release | — |
| firefox | Not affected | Not affected | Fixed | — |
| thunderbird | Not affected | Fixed | Not in release | — |
| mozjs38 | Not in release | Not in release | Not in release | Needs evaluation |
| mozjs52 | Not in release | Not in release | Needs evaluation | Ignored |
| mozjs68 | Not in release | Not in release | Ignored | — |
| mozjs91 | Not in release | Ignored | Not in release | — |
| mozjs102 | Ignored | Ignored | Not in release | — |
| mozjs115 | Ignored | Not in release | Not in release | — |
Some fixes available 2 of 13
An attacker could have caused a use-after-free via crafted XSLT data, leading to a potentially exploitable crash. This vulnerability affects Firefox < 135, Firefox ESR < 115.20, Firefox ESR < 128.7, Thunderbird < 128.7, and...
9 affected packages
mozjs68, mozjs78, mozjs91, mozjs102, mozjs115...
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| mozjs68 | Not in release | Not in release | Ignored | — |
| mozjs78 | Not in release | Ignored | Not in release | — |
| mozjs91 | Not in release | Ignored | Not in release | — |
| mozjs102 | Ignored | Ignored | Not in release | — |
| mozjs115 | Ignored | Not in release | Not in release | — |
| firefox | Not affected | Not affected | Fixed | — |
| thunderbird | Not affected | Fixed | Not in release | — |
| mozjs38 | Not in release | Not in release | Not in release | Needs evaluation |
| mozjs52 | Not in release | Not in release | Needs evaluation | Ignored |
Some fixes available 1 of 12
Memory safety bugs present in Firefox 134 and Thunderbird 134. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This...
9 affected packages
mozjs52, firefox, thunderbird, mozjs38, mozjs68...
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| mozjs52 | Not in release | Not in release | Needs evaluation | Ignored |
| firefox | Not affected | Not affected | Fixed | — |
| thunderbird | Not affected | Not affected | Not in release | — |
| mozjs38 | Not in release | Not in release | Not in release | Needs evaluation |
| mozjs68 | Not in release | Not in release | Ignored | — |
| mozjs78 | Not in release | Ignored | Not in release | — |
| mozjs91 | Not in release | Ignored | Not in release | — |
| mozjs102 | Ignored | Ignored | Not in release | — |
| mozjs115 | Ignored | Not in release | Not in release | — |
Some fixes available 1 of 12
The z-order of the browser windows could be manipulated to hide the fullscreen notification. This could potentially be leveraged to perform a spoofing attack. This vulnerability affects Firefox < 135 and Thunderbird < 135.
9 affected packages
firefox, thunderbird, mozjs38, mozjs52, mozjs68...
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| firefox | Not affected | Not affected | Fixed | — |
| thunderbird | Not affected | Not affected | Not in release | — |
| mozjs38 | Not in release | Not in release | Not in release | Needs evaluation |
| mozjs52 | Not in release | Not in release | Needs evaluation | Ignored |
| mozjs68 | Not in release | Not in release | Ignored | — |
| mozjs78 | Not in release | Ignored | Not in release | — |
| mozjs91 | Not in release | Ignored | Not in release | — |
| mozjs102 | Ignored | Ignored | Not in release | — |
| mozjs115 | Ignored | Not in release | Not in release | — |
Some fixes available 1 of 12
The fullscreen notification is prematurely hidden when fullscreen is re-requested quickly by the user. This could have been leveraged to perform a potential spoofing attack. This vulnerability affects Firefox < 135 and Thunderbird < 135.
9 affected packages
mozjs68, mozjs78, mozjs91, mozjs102, firefox...
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| mozjs68 | Not in release | Not in release | Ignored | — |
| mozjs78 | Not in release | Ignored | Not in release | — |
| mozjs91 | Not in release | Ignored | Not in release | — |
| mozjs102 | Ignored | Ignored | Not in release | — |
| firefox | Not affected | Not affected | Fixed | — |
| thunderbird | Not affected | Not affected | Not in release | — |
| mozjs38 | Not in release | Not in release | Not in release | Needs evaluation |
| mozjs52 | Not in release | Not in release | Needs evaluation | Ignored |
| mozjs115 | Ignored | Not in release | Not in release | — |
Long hostnames in URLs could be leveraged to obscure the actual host of the website or spoof the website address This vulnerability affects Firefox for iOS < 134.
2 affected packages
firefox, thunderbird
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| firefox | Not affected | Not affected | Not in release | — |
| thunderbird | Not affected | Not affected | Not in release | — |
Opening Javascript links in a new tab via long-press in the Firefox iOS client could result in a malicious script spoofing the URL of the new tab. This vulnerability affects Firefox for iOS < 134.
2 affected packages
firefox, thunderbird
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| firefox | Not affected | Not affected | Not in release | — |
| thunderbird | Not affected | Not affected | Not in release | — |
Some fixes available 1 of 12
Memory safety bugs present in Firefox 133 and Thunderbird 133. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This...
9 affected packages
firefox, thunderbird, mozjs38, mozjs52, mozjs68...
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| firefox | Not affected | Not affected | Fixed | — |
| thunderbird | Not affected | Not affected | Not in release | — |
| mozjs38 | Not in release | Not in release | Not in release | Needs evaluation |
| mozjs52 | Not in release | Not in release | Needs evaluation | Ignored |
| mozjs68 | Not in release | Not in release | Ignored | — |
| mozjs78 | Not in release | Ignored | Not in release | — |
| mozjs91 | Not in release | Ignored | Not in release | — |
| mozjs102 | Ignored | Ignored | Not in release | — |
| mozjs115 | Ignored | Not in release | Not in release | — |
When using an invalid protocol scheme, an attacker could spoof the address bar. *Note: This issue only affected Android operating systems. Other operating systems are unaffected.* *Note: This issue is a different issue from...
2 affected packages
firefox, thunderbird
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| firefox | Not affected | Not affected | Not in release | — |
| thunderbird | Not affected | Not affected | Not in release | — |
Under certain circumstances, a user opt-in setting that Focus should require authentication before use could have been be bypassed. This vulnerability affects Firefox < 134.
2 affected packages
firefox, thunderbird
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| firefox | Not affected | Not affected | Not in release | — |
| thunderbird | Not affected | Not affected | Not in release | — |