Search CVE reports
1081 – 1090 of 2391 results
Some fixes available 13 of 19
When in an endless loop, a website specifying a custom cursor using CSS could make it look like the user is interacting with the user interface, when they are not. This could lead to a perceived broken state, especially when...
6 affected packages
thunderbird, firefox, mozjs38, mozjs52, mozjs60, mozjs68
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| thunderbird | — | Not affected | Not affected | Fixed | Fixed |
| firefox | — | Fixed | Fixed | Fixed | Fixed |
| mozjs38 | — | Not in release | Not in release | Not in release | Ignored |
| mozjs52 | — | Not in release | Not in release | Ignored | Ignored |
| mozjs60 | — | Not in release | Not in release | Not in release | Not in release |
| mozjs68 | — | Not in release | Not in release | Ignored | Not in release |
Some fixes available 13 of 19
An iframe sandbox element with the allow-popups flag could be bypassed when using noopener links. This could have led to security issues for websites relying on sandbox configurations that allowed popups and hosted...
6 affected packages
firefox, mozjs38, mozjs60, mozjs68, thunderbird, mozjs52
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| firefox | — | Fixed | Fixed | Fixed | Fixed |
| mozjs38 | — | Not in release | Not in release | Not in release | Ignored |
| mozjs60 | — | Not in release | Not in release | Not in release | Not in release |
| mozjs68 | — | Not in release | Not in release | Ignored | Not in release |
| thunderbird | — | Not affected | Not affected | Fixed | Fixed |
| mozjs52 | — | Not in release | Not in release | Ignored | Ignored |
Some fixes available 13 of 19
By observing the stack trace for JavaScript errors in web workers, it was possible to leak the result of a cross-origin redirect. This applied only to content that can be parsed as script. This vulnerability affects Firefox < 79,...
6 affected packages
firefox, mozjs38, mozjs60, mozjs68, thunderbird, mozjs52
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| firefox | — | Fixed | Fixed | Fixed | Fixed |
| mozjs38 | — | Not in release | Not in release | Not in release | Ignored |
| mozjs60 | — | Not in release | Not in release | Not in release | Not in release |
| mozjs68 | — | Not in release | Not in release | Ignored | Not in release |
| thunderbird | — | Not affected | Not affected | Fixed | Fixed |
| mozjs52 | — | Not in release | Not in release | Ignored | Ignored |
Inappropriate implementation in WebRTC in Google Chrome prior to 84.0.4147.89 allowed an attacker in a privileged network position to potentially exploit heap corruption via a crafted SCTP stream.
3 affected packages
chromium-browser, firefox, thunderbird
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| chromium-browser | — | — | Not affected | Not in release | Fixed |
| firefox | — | — | Fixed | Fixed | Fixed |
| thunderbird | — | — | Not affected | Fixed | Fixed |
When the Windows DLL "webauthn.dll" was missing from the Operating System, and a malicious one was placed in a folder in the user's %PATH%, Firefox may have loaded the DLL, leading to arbitrary code execution. *Note: This issue...
2 affected packages
thunderbird, firefox
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| thunderbird | — | — | — | Not in release | Not affected |
| firefox | — | — | — | Not in release | Not affected |
For native-to-JS bridging the app requires a unique token to be passed that ensures non-app code can't call the bridging functions. That token could leak when used for downloading files. This vulnerability affects Firefox for iOS < 26.
6 affected packages
firefox, mozjs38, mozjs52, mozjs60, mozjs68, thunderbird
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| firefox | — | — | — | Not in release | Not affected |
| mozjs38 | — | — | — | Not in release | Not affected |
| mozjs52 | — | — | — | Not affected | Not affected |
| mozjs60 | — | — | — | Not in release | Not in release |
| mozjs68 | — | — | — | Not affected | Not in release |
| thunderbird | — | — | — | Not in release | Not affected |
Some fixes available 14 of 23
Mozilla developers and community members reported memory safety bugs present in Firefox 77. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to...
6 affected packages
thunderbird, mozjs68, firefox, mozjs38, mozjs52, mozjs60
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| thunderbird | — | Not affected | Not affected | Fixed | Fixed |
| mozjs68 | — | Not in release | Not in release | Ignored | Not in release |
| firefox | — | Fixed | Fixed | Fixed | Fixed |
| mozjs38 | — | Not in release | Not in release | Not in release | Ignored |
| mozjs52 | — | Not in release | Not in release | Ignored | Ignored |
| mozjs60 | — | Not in release | Not in release | Not in release | Not in release |
Some fixes available 14 of 23
Due to confusion processing a hyphen character in Date.parse(), a one-byte out of bounds read could have occurred, leading to potential information disclosure. This vulnerability affects Firefox < 78.
6 affected packages
mozjs38, mozjs52, mozjs60, thunderbird, firefox, mozjs68
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| mozjs38 | — | Not in release | Not in release | Not in release | Ignored |
| mozjs52 | — | Not in release | Not in release | Ignored | Ignored |
| mozjs60 | — | Not in release | Not in release | Not in release | Not in release |
| thunderbird | — | Not affected | Not affected | Fixed | Fixed |
| firefox | — | Fixed | Fixed | Fixed | Fixed |
| mozjs68 | — | Not in release | Not in release | Ignored | Not in release |
Some fixes available 14 of 23
When constructing a permission prompt for WebRTC, a URI was supplied from the content process. This URI was untrusted, and could have been the URI of an origin that was previously granted permission; bypassing the prompt. This...
6 affected packages
firefox, mozjs52, thunderbird, mozjs68, mozjs38, mozjs60
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| firefox | — | Fixed | Fixed | Fixed | Fixed |
| mozjs52 | — | Not in release | Not in release | Ignored | Ignored |
| thunderbird | — | Not affected | Not affected | Fixed | Fixed |
| mozjs68 | — | Not in release | Not in release | Ignored | Not in release |
| mozjs38 | — | Not in release | Not in release | Not in release | Ignored |
| mozjs60 | — | Not in release | Not in release | Not in release | Not in release |
Some fixes available 14 of 22
In non-standard configurations, a JPEG image created by JavaScript could have caused an internal variable to overflow, resulting in an out of bounds write, memory corruption, and a potentially exploitable crash. This vulnerability...
6 affected packages
mozjs60, mozjs68, mozjs38, mozjs52, thunderbird, firefox
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| mozjs60 | — | Not in release | Not in release | Not in release | Not in release |
| mozjs68 | — | Not in release | Not in release | Ignored | Not in release |
| mozjs38 | — | Not in release | Not in release | Not in release | Ignored |
| mozjs52 | — | Not in release | Not in release | Ignored | Ignored |
| thunderbird | — | Not affected | Not affected | Fixed | Fixed |
| firefox | — | Fixed | Fixed | Fixed | Fixed |