Search CVE reports
651 – 660 of 720 results
Some fixes available 11 of 17
Incorrect bookkeeping of functions inlined during JIT compilation could have led to memory corruption and a potentially exploitable crash when handling out-of-memory errors. This vulnerability affects Firefox < 83.
5 affected packages
firefox, mozjs38, mozjs52, mozjs60, mozjs68
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
firefox | Fixed | Fixed | Fixed | Fixed |
mozjs38 | Not in release | Not in release | Not in release | Ignored |
mozjs52 | Not in release | Not in release | Ignored | Ignored |
mozjs60 | Not in release | Not in release | Not in release | Not in release |
mozjs68 | Not in release | Not in release | Ignored | Not in release |
Some fixes available 21 of 27
A parsing and event loading mismatch in Firefox's SVG code could have allowed load events to fire, even after sanitization. An attacker already capable of exploiting an XSS vulnerability in privileged internal pages could have...
6 affected packages
firefox, mozjs38, mozjs60, mozjs68, mozjs52, thunderbird
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
firefox | Fixed | Fixed | Fixed | Fixed |
mozjs38 | Not in release | Not in release | Not in release | Ignored |
mozjs60 | Not in release | Not in release | Not in release | Not in release |
mozjs68 | Not in release | Not in release | Ignored | Not in release |
mozjs52 | Not in release | Not in release | Ignored | Ignored |
thunderbird | Fixed | Fixed | Fixed | Fixed |
Some fixes available 23 of 29
Side-channel information leakage in graphics in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
7 affected packages
firefox, mozjs38, mozjs60, mozjs68, thunderbird...
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
firefox | Fixed | Fixed | Fixed | Fixed |
mozjs38 | Not in release | Not in release | Not in release | Ignored |
mozjs60 | Not in release | Not in release | Not in release | Not in release |
mozjs68 | Not in release | Not in release | Ignored | Not in release |
thunderbird | Fixed | Fixed | Fixed | Fixed |
chromium-browser | Not affected | Not affected | Not in release | Fixed |
mozjs52 | Not in release | Not in release | Ignored | Ignored |
Some fixes available 21 of 27
In certain circumstances, the MCallGetProperty opcode can be emitted with unmet assumptions resulting in an exploitable use-after-free condition. This vulnerability affects Firefox < 82.0.3, Firefox ESR < 78.4.1, and Thunderbird < 78.4.2.
6 affected packages
firefox, thunderbird, mozjs38, mozjs52, mozjs60, mozjs68
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
firefox | Fixed | Fixed | Fixed | Fixed |
thunderbird | Fixed | Fixed | Fixed | Fixed |
mozjs38 | Not in release | Not in release | Not in release | Ignored |
mozjs52 | Not in release | Not in release | Ignored | Ignored |
mozjs60 | Not in release | Not in release | Not in release | Not in release |
mozjs68 | Not in release | Not in release | Ignored | Not in release |
Some fixes available 11 of 17
Mozilla developers reported memory safety bugs present in Firefox 81. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code....
5 affected packages
mozjs52, firefox, mozjs38, mozjs60, mozjs68
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
mozjs52 | Not in release | Not in release | Ignored | Ignored |
firefox | Fixed | Fixed | Fixed | Fixed |
mozjs38 | Not in release | Not in release | Not in release | Ignored |
mozjs60 | Not in release | Not in release | Not in release | Not in release |
mozjs68 | Not in release | Not in release | Ignored | Not in release |
Some fixes available 21 of 27
Mozilla developers and community members reported memory safety bugs present in Firefox 81 and Firefox ESR 78.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could...
6 affected packages
mozjs52, mozjs68, firefox, mozjs38, mozjs60, thunderbird
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
mozjs52 | Not in release | Not in release | Ignored | Ignored |
mozjs68 | Not in release | Not in release | Ignored | Not in release |
firefox | Fixed | Fixed | Fixed | Fixed |
mozjs38 | Not in release | Not in release | Not in release | Ignored |
mozjs60 | Not in release | Not in release | Not in release | Not in release |
thunderbird | Fixed | Fixed | Fixed | Fixed |
Some fixes available 11 of 17
When a link to an external protocol was clicked, a prompt was presented that allowed the user to choose what application to open it in. An attacker could induce that prompt to be associated with an origin they didn't control,...
5 affected packages
mozjs52, mozjs68, mozjs38, mozjs60, firefox
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
mozjs52 | Not in release | Not in release | Ignored | Ignored |
mozjs68 | Not in release | Not in release | Ignored | Not in release |
mozjs38 | Not in release | Not in release | Not in release | Ignored |
mozjs60 | Not in release | Not in release | Not in release | Not in release |
firefox | Fixed | Fixed | Fixed | Fixed |
Some fixes available 11 of 17
When multiple WASM threads had a reference to a module, and were looking up exported functions, one WASM thread could have overwritten another's entry in a shared stub table, resulting in a potentially exploitable crash....
5 affected packages
mozjs52, firefox, mozjs38, mozjs68, mozjs60
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
mozjs52 | Not in release | Not in release | Ignored | Ignored |
firefox | Fixed | Fixed | Fixed | Fixed |
mozjs38 | Not in release | Not in release | Not in release | Ignored |
mozjs68 | Not in release | Not in release | Ignored | Not in release |
mozjs60 | Not in release | Not in release | Not in release | Not in release |
Some fixes available 11 of 17
If a valid external protocol handler was referenced in an image tag, the resulting broken image size could be distinguished from a broken image size of a non-existent protocol handler. This allowed an attacker to successfully...
5 affected packages
mozjs52, mozjs68, firefox, mozjs38, mozjs60
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
mozjs52 | Not in release | Not in release | Ignored | Ignored |
mozjs68 | Not in release | Not in release | Ignored | Not in release |
firefox | Fixed | Fixed | Fixed | Fixed |
mozjs38 | Not in release | Not in release | Not in release | Ignored |
mozjs60 | Not in release | Not in release | Not in release | Not in release |
Some fixes available 13 of 29
Crossbeam is a set of tools for concurrent programming. In crossbeam-channel before version 0.4.4, the bounded channel incorrectly assumes that `Vec::from_iter` has allocated capacity that same as the number of iterator elements....
6 affected packages
mozjs52, mozjs68, firefox, mozjs38, mozjs60, rust-crossbeam
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
mozjs52 | Not in release | Not in release | Ignored | Ignored |
mozjs68 | Not in release | Not in release | Ignored | Not in release |
firefox | Fixed | Fixed | Fixed | Fixed |
mozjs38 | Not in release | Not in release | Not in release | Ignored |
mozjs60 | Not in release | Not in release | Not in release | Not in release |
rust-crossbeam | Needs evaluation | Needs evaluation | Needs evaluation | Not in release |