Search CVE reports
681 – 690 of 720 results
Some fixes available 13 of 19
An iframe sandbox element with the allow-popups flag could be bypassed when using noopener links. This could have led to security issues for websites relying on sandbox configurations that allowed popups and hosted...
6 affected packages
firefox, mozjs38, mozjs60, mozjs68, thunderbird, mozjs52
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
firefox | Fixed | Fixed | Fixed | Fixed |
mozjs38 | Not in release | Not in release | Not in release | Ignored |
mozjs60 | Not in release | Not in release | Not in release | Not in release |
mozjs68 | Not in release | Not in release | Ignored | Not in release |
thunderbird | Not affected | Not affected | Fixed | Fixed |
mozjs52 | Not in release | Not in release | Ignored | Ignored |
Some fixes available 13 of 19
By observing the stack trace for JavaScript errors in web workers, it was possible to leak the result of a cross-origin redirect. This applied only to content that can be parsed as script. This vulnerability affects Firefox < 79,...
6 affected packages
firefox, mozjs38, mozjs60, mozjs68, thunderbird, mozjs52
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
firefox | Fixed | Fixed | Fixed | Fixed |
mozjs38 | Not in release | Not in release | Not in release | Ignored |
mozjs60 | Not in release | Not in release | Not in release | Not in release |
mozjs68 | Not in release | Not in release | Ignored | Not in release |
thunderbird | Not affected | Not affected | Fixed | Fixed |
mozjs52 | Not in release | Not in release | Ignored | Ignored |
For native-to-JS bridging the app requires a unique token to be passed that ensures non-app code can't call the bridging functions. That token could leak when used for downloading files. This vulnerability affects Firefox for iOS < 26.
6 affected packages
firefox, mozjs38, mozjs52, mozjs60, mozjs68, thunderbird
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
firefox | — | — | Not in release | Not affected |
mozjs38 | — | — | Not in release | Not affected |
mozjs52 | — | — | Not affected | Not affected |
mozjs60 | — | — | Not in release | Not in release |
mozjs68 | — | — | Not affected | Not in release |
thunderbird | — | — | Not in release | Not affected |
Some fixes available 14 of 23
Mozilla developers and community members reported memory safety bugs present in Firefox 77. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to...
6 affected packages
thunderbird, mozjs68, firefox, mozjs38, mozjs52, mozjs60
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
thunderbird | Not affected | Not affected | Fixed | Fixed |
mozjs68 | Not in release | Not in release | Ignored | Not in release |
firefox | Fixed | Fixed | Fixed | Fixed |
mozjs38 | Not in release | Not in release | Not in release | Ignored |
mozjs52 | Not in release | Not in release | Ignored | Ignored |
mozjs60 | Not in release | Not in release | Not in release | Not in release |
Some fixes available 14 of 23
Due to confusion processing a hyphen character in Date.parse(), a one-byte out of bounds read could have occurred, leading to potential information disclosure. This vulnerability affects Firefox < 78.
6 affected packages
mozjs38, mozjs52, mozjs60, thunderbird, firefox, mozjs68
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
mozjs38 | Not in release | Not in release | Not in release | Ignored |
mozjs52 | Not in release | Not in release | Ignored | Ignored |
mozjs60 | Not in release | Not in release | Not in release | Not in release |
thunderbird | Not affected | Not affected | Fixed | Fixed |
firefox | Fixed | Fixed | Fixed | Fixed |
mozjs68 | Not in release | Not in release | Ignored | Not in release |
Some fixes available 14 of 23
When constructing a permission prompt for WebRTC, a URI was supplied from the content process. This URI was untrusted, and could have been the URI of an origin that was previously granted permission; bypassing the prompt. This...
6 affected packages
firefox, mozjs52, thunderbird, mozjs68, mozjs38, mozjs60
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
firefox | Fixed | Fixed | Fixed | Fixed |
mozjs52 | Not in release | Not in release | Ignored | Ignored |
thunderbird | Not affected | Not affected | Fixed | Fixed |
mozjs68 | Not in release | Not in release | Ignored | Not in release |
mozjs38 | Not in release | Not in release | Not in release | Ignored |
mozjs60 | Not in release | Not in release | Not in release | Not in release |
Some fixes available 14 of 22
In non-standard configurations, a JPEG image created by JavaScript could have caused an internal variable to overflow, resulting in an out of bounds write, memory corruption, and a potentially exploitable crash. This vulnerability...
6 affected packages
mozjs60, mozjs68, mozjs38, mozjs52, thunderbird, firefox
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
mozjs60 | Not in release | Not in release | Not in release | Not in release |
mozjs68 | Not in release | Not in release | Ignored | Not in release |
mozjs38 | Not in release | Not in release | Not in release | Ignored |
mozjs52 | Not in release | Not in release | Ignored | Ignored |
thunderbird | Not affected | Not affected | Fixed | Fixed |
firefox | Fixed | Fixed | Fixed | Fixed |
Some fixes available 24 of 32
When performing add-on updates, certificate chains terminating in non-built-in-roots were rejected (even if they were legitimately added by an administrator.) This could have caused add-ons to become out-of-date silently without...
7 affected packages
mozjs52, firefox-esr, firefox, mozjs38, mozjs60...
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
mozjs52 | Not in release | Not in release | Ignored | Ignored |
firefox-esr | Not in release | Not in release | Not in release | Not in release |
firefox | Fixed | Fixed | Fixed | Fixed |
mozjs38 | Not in release | Not in release | Not in release | Ignored |
mozjs60 | Not in release | Not in release | Not in release | Not in release |
mozjs68 | Not in release | Not in release | Ignored | Not in release |
thunderbird | Fixed | Fixed | Fixed | Fixed |
Some fixes available 24 of 32
When trying to connect to a STUN server, a race condition could have caused a use-after-free of a pointer, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox ESR < 68.10, Firefox <...
7 affected packages
mozjs52, mozjs68, firefox-esr, mozjs38, firefox...
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
mozjs52 | Not in release | Not in release | Ignored | Ignored |
mozjs68 | Not in release | Not in release | Ignored | Not in release |
firefox-esr | Not in release | Not in release | Not in release | Not in release |
mozjs38 | Not in release | Not in release | Not in release | Ignored |
firefox | Fixed | Fixed | Fixed | Fixed |
thunderbird | Fixed | Fixed | Fixed | Fixed |
mozjs60 | Not in release | Not in release | Not in release | Not in release |
Some fixes available 24 of 32
When processing callbacks that occurred during window flushing in the parent process, the associated window may die; causing a use-after-free condition. This could have led to memory corruption and a potentially exploitable crash....
7 affected packages
mozjs52, mozjs68, firefox, firefox-esr, mozjs38...
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
mozjs52 | Not in release | Not in release | Ignored | Ignored |
mozjs68 | Not in release | Not in release | Ignored | Not in release |
firefox | Fixed | Fixed | Fixed | Fixed |
firefox-esr | Not in release | Not in release | Not in release | Not in release |
mozjs38 | Not in release | Not in release | Not in release | Ignored |
mozjs60 | Not in release | Not in release | Not in release | Not in release |
thunderbird | Fixed | Fixed | Fixed | Fixed |