Search CVE reports
701 – 710 of 720 results
Some fixes available 24 of 32
When browsing a malicious page, a race condition in our SharedWorkerService could occur and lead to a potentially exploitable crash. This vulnerability affects Thunderbird < 68.9.0, Firefox < 77, and Firefox ESR < 68.9.
6 affected packages
mozjs52, mozjs68, firefox, mozjs38, thunderbird, mozjs60
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
mozjs52 | Not in release | Not in release | Ignored | Ignored |
mozjs68 | Not in release | Not in release | Ignored | Not in release |
firefox | Fixed | Fixed | Fixed | Fixed |
mozjs38 | Not in release | Not in release | Not in release | Ignored |
thunderbird | Fixed | Fixed | Fixed | Fixed |
mozjs60 | Not in release | Not in release | Not in release | Not in release |
For native-to-JS bridging, the app requires a unique token to be passed that ensures non-app code can't call the bridging functions. That token was being used for JS-to-native also, but it isn't needed in this case, and its usage...
6 affected packages
firefox, mozjs38, mozjs52, mozjs60, mozjs68, thunderbird
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
firefox | — | — | Not in release | Not affected |
mozjs38 | — | — | Not in release | Not affected |
mozjs52 | — | — | Not affected | Not affected |
mozjs60 | — | — | Not in release | Not in release |
mozjs68 | — | — | Not affected | Not in release |
thunderbird | — | — | Not in release | Not affected |
The Firefox content processes did not sufficiently lockdown access control which could result in a sandbox escape. *Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox ESR <...
5 affected packages
mozjs38, mozjs52, mozjs60, mozjs68, firefox
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
mozjs38 | Not in release | Not in release | Not in release | Ignored |
mozjs52 | Not in release | Not in release | Ignored | Ignored |
mozjs60 | Not in release | Not in release | Not in release | Not in release |
mozjs68 | Not in release | Not in release | Ignored | Not in release |
firefox | Not affected | Not affected | Not in release | Not affected |
The Firefox content processes did not sufficiently lockdown access control which could result in a sandbox escape. *Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox ESR <...
5 affected packages
mozjs52, mozjs68, firefox, mozjs38, mozjs60
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
mozjs52 | Not in release | Not in release | Ignored | Ignored |
mozjs68 | Not in release | Not in release | Ignored | Not in release |
firefox | Not affected | Not affected | Not in release | Not affected |
mozjs38 | Not in release | Not in release | Not in release | Ignored |
mozjs60 | Not in release | Not in release | Not in release | Not in release |
The 'Copy as cURL' feature of Devtools' network tab did not properly escape the HTTP method of a request, which can be controlled by the website. If a user used the 'Copy as cURL' feature and pasted the command into a terminal, it...
6 affected packages
mozjs52, mozjs68, firefox, mozjs38, mozjs60, thunderbird
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
mozjs52 | Not in release | Not in release | Ignored | Ignored |
mozjs68 | Not in release | Not in release | Ignored | Not in release |
firefox | Not affected | Not affected | Not in release | Not affected |
mozjs38 | Not in release | Not in release | Not in release | Ignored |
mozjs60 | Not in release | Not in release | Not in release | Not in release |
thunderbird | Not affected | Not affected | Not in release | Not affected |
Some fixes available 15 of 21
Use after free in ANGLE in Google Chrome prior to 81.0.4044.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
7 affected packages
chromium-browser, firefox, thunderbird, mozjs38, mozjs60...
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
chromium-browser | Not affected | Not affected | Not in release | Fixed |
firefox | Fixed | Fixed | Fixed | Fixed |
thunderbird | Not affected | Not affected | Fixed | Fixed |
mozjs38 | Not in release | Not in release | Not in release | Ignored |
mozjs60 | Not in release | Not in release | Not in release | Not in release |
mozjs52 | Not in release | Not in release | Ignored | Ignored |
mozjs68 | Not in release | Not in release | Ignored | Not in release |
Some fixes available 12 of 20
Mozilla developers and community members reported memory safety bugs present in Firefox 75. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to...
5 affected packages
mozjs52, mozjs68, firefox, mozjs38, mozjs60
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
mozjs52 | Not in release | Not in release | Ignored | Ignored |
mozjs68 | Not in release | Not in release | Ignored | Not in release |
firefox | Fixed | Fixed | Fixed | Fixed |
mozjs38 | Not in release | Not in release | Not in release | Ignored |
mozjs60 | Not in release | Not in release | Not in release | Not in release |
Some fixes available 12 of 20
A logic flaw in our location bar implementation could have allowed a local attacker to spoof the current location by selecting a different origin and removing focus from the input element. This vulnerability affects Firefox < 76.
5 affected packages
mozjs52, mozjs68, firefox, mozjs38, mozjs60
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
mozjs52 | Not in release | Not in release | Ignored | Ignored |
mozjs68 | Not in release | Not in release | Ignored | Not in release |
firefox | Fixed | Fixed | Fixed | Fixed |
mozjs38 | Not in release | Not in release | Not in release | Ignored |
mozjs60 | Not in release | Not in release | Not in release | Not in release |
Some fixes available 12 of 20
Documents formed using data: URLs in an OBJECT element failed to inherit the CSP of the creating context. This allowed the execution of scripts that should have been blocked, albeit with a unique opaque origin. This vulnerability...
5 affected packages
firefox, mozjs52, mozjs68, mozjs38, mozjs60
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
firefox | Fixed | Fixed | Fixed | Fixed |
mozjs52 | Not in release | Not in release | Ignored | Ignored |
mozjs68 | Not in release | Not in release | Ignored | Not in release |
mozjs38 | Not in release | Not in release | Not in release | Ignored |
mozjs60 | Not in release | Not in release | Not in release | Not in release |
Some fixes available 12 of 20
Incorrect origin serialization of URLs with IPv6 addresses could lead to incorrect security checks. This vulnerability affects Firefox < 76.
5 affected packages
firefox, mozjs38, mozjs52, mozjs68, mozjs60
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
firefox | Fixed | Fixed | Fixed | Fixed |
mozjs38 | Not in release | Not in release | Not in release | Ignored |
mozjs52 | Not in release | Not in release | Ignored | Ignored |
mozjs68 | Not in release | Not in release | Ignored | Not in release |
mozjs60 | Not in release | Not in release | Not in release | Not in release |