Search CVE reports
321 – 330 of 1098 results
Some fixes available 2 of 13
Repeated writes to history interface attributes could have been used to cause a Denial of Service condition in the browser. This was addressed by introducing rate-limiting to this API. This vulnerability affects Firefox < 132,...
9 affected packages
firefox, thunderbird, mozjs38, mozjs52, mozjs68...
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| firefox | — | Not affected | Not affected | Fixed | — |
| thunderbird | — | Not affected | Fixed | Not in release | — |
| mozjs38 | — | Not in release | Not in release | Not in release | Needs evaluation |
| mozjs52 | — | Not in release | Not in release | Needs evaluation | Ignored |
| mozjs68 | — | Not in release | Not in release | Ignored | — |
| mozjs78 | — | Not in release | Ignored | Not in release | — |
| mozjs91 | — | Not in release | Ignored | Not in release | — |
| mozjs102 | — | Ignored | Ignored | Not in release | — |
| mozjs115 | — | Ignored | Not in release | Not in release | — |
Some fixes available 3 of 14
Video frames could have been leaked between origins in some situations. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Firefox ESR < 115.17, Thunderbird < 128.4, and Thunderbird < 132.
9 affected packages
firefox, thunderbird, mozjs38, mozjs52, mozjs68...
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| firefox | — | Not affected | Not affected | Fixed | — |
| thunderbird | — | Not affected | Fixed | Fixed | — |
| mozjs38 | — | Not in release | Not in release | Not in release | Needs evaluation |
| mozjs52 | — | Not in release | Not in release | Needs evaluation | Ignored |
| mozjs68 | — | Not in release | Not in release | Ignored | — |
| mozjs78 | — | Not in release | Ignored | Not in release | — |
| mozjs91 | — | Not in release | Ignored | Not in release | — |
| mozjs102 | — | Ignored | Ignored | Not in release | — |
| mozjs115 | — | Ignored | Not in release | Not in release | — |
Some fixes available 2 of 13
Truncation of a long URL could have allowed origin spoofing in a permission prompt. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Thunderbird < 128.4, and Thunderbird < 132.
9 affected packages
firefox, thunderbird, mozjs38, mozjs52, mozjs68...
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| firefox | — | Not affected | Not affected | Fixed | — |
| thunderbird | — | Not affected | Fixed | Not in release | — |
| mozjs38 | — | Not in release | Not in release | Not in release | Needs evaluation |
| mozjs52 | — | Not in release | Not in release | Needs evaluation | Ignored |
| mozjs68 | — | Not in release | Not in release | Ignored | — |
| mozjs78 | — | Not in release | Ignored | Not in release | — |
| mozjs91 | — | Not in release | Ignored | Not in release | — |
| mozjs102 | — | Ignored | Ignored | Not in release | — |
| mozjs115 | — | Ignored | Not in release | Not in release | — |
Some fixes available 2 of 13
In multipart/x-mixed-replace responses, `Content-Disposition: attachment` in the response header was not respected and did not force a download, which could allow XSS attacks. This vulnerability affects Firefox < 132, Firefox ESR...
9 affected packages
firefox, thunderbird, mozjs38, mozjs52, mozjs68...
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| firefox | — | Not affected | Not affected | Fixed | — |
| thunderbird | — | Not affected | Fixed | Not in release | — |
| mozjs38 | — | Not in release | Not in release | Not in release | Needs evaluation |
| mozjs52 | — | Not in release | Not in release | Needs evaluation | Ignored |
| mozjs68 | — | Not in release | Not in release | Ignored | — |
| mozjs78 | — | Not in release | Ignored | Not in release | — |
| mozjs91 | — | Not in release | Ignored | Not in release | — |
| mozjs102 | — | Ignored | Ignored | Not in release | — |
| mozjs115 | — | Ignored | Not in release | Not in release | — |
Some fixes available 2 of 13
The origin of an external protocol handler prompt could have been obscured using a data: URL within an `iframe`. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Thunderbird < 128.4, and Thunderbird < 132.
9 affected packages
firefox, thunderbird, mozjs38, mozjs52, mozjs68...
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| firefox | — | Not affected | Not affected | Fixed | — |
| thunderbird | — | Not affected | Fixed | Not in release | — |
| mozjs38 | — | Not in release | Not in release | Not in release | Needs evaluation |
| mozjs52 | — | Not in release | Not in release | Needs evaluation | Ignored |
| mozjs68 | — | Not in release | Not in release | Ignored | — |
| mozjs78 | — | Not in release | Ignored | Not in release | — |
| mozjs91 | — | Not in release | Ignored | Not in release | — |
| mozjs102 | — | Ignored | Ignored | Not in release | — |
| mozjs115 | — | Ignored | Not in release | Not in release | — |
Some fixes available 3 of 14
An attacker could have caused a use-after-free when accessibility was enabled, leading to a potentially exploitable crash. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Firefox ESR < 115.17, Thunderbird < 128.4,...
9 affected packages
firefox, thunderbird, mozjs38, mozjs52, mozjs68...
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| firefox | — | Not affected | Not affected | Fixed | — |
| thunderbird | — | Not affected | Fixed | Fixed | — |
| mozjs38 | — | Not in release | Not in release | Not in release | Needs evaluation |
| mozjs52 | — | Not in release | Not in release | Needs evaluation | Ignored |
| mozjs68 | — | Not in release | Not in release | Ignored | — |
| mozjs78 | — | Not in release | Ignored | Not in release | — |
| mozjs91 | — | Not in release | Ignored | Not in release | — |
| mozjs102 | — | Ignored | Ignored | Not in release | — |
| mozjs115 | — | Ignored | Not in release | Not in release | — |
Some fixes available 3 of 14
A permission leak could have occurred from a trusted site to an untrusted site via `embed` or `object` elements. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Firefox ESR < 115.17, Thunderbird < 128.4,...
9 affected packages
firefox, thunderbird, mozjs38, mozjs52, mozjs68...
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| firefox | Not affected | Not affected | Not affected | Fixed | — |
| thunderbird | Not affected | Not affected | Fixed | Fixed | — |
| mozjs38 | Not in release | Not in release | Not in release | Not in release | Needs evaluation |
| mozjs52 | Not in release | Not in release | Not in release | Ignored | Ignored |
| mozjs68 | Not in release | Not in release | Not in release | Ignored | — |
| mozjs78 | Not in release | Not in release | Ignored | Not in release | — |
| mozjs91 | Not in release | Not in release | Ignored | Not in release | — |
| mozjs102 | Not in release | Ignored | Ignored | Not in release | — |
| mozjs115 | Not in release | Ignored | Not in release | Not in release | — |
Some fixes available 1 of 12
When manipulating the selection node cache, an attacker may have been able to cause unexpected behavior, potentially leading to an exploitable crash. This vulnerability affects Firefox < 131.0.3.
9 affected packages
firefox, thunderbird, mozjs38, mozjs52, mozjs68...
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| firefox | Not affected | Not affected | Not affected | Fixed | — |
| thunderbird | Not affected | Not affected | Not affected | Not in release | — |
| mozjs38 | — | Not in release | Not in release | Not in release | Needs evaluation |
| mozjs52 | — | Not in release | Not in release | Ignored | Ignored |
| mozjs68 | — | Not in release | Not in release | Ignored | — |
| mozjs78 | — | Not in release | Ignored | Not in release | — |
| mozjs91 | — | Not in release | Ignored | Not in release | — |
| mozjs102 | Not in release | Ignored | Ignored | Not in release | — |
| mozjs115 | Not in release | Ignored | Not in release | Not in release | — |
Some fixes available 3 of 13
An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines. We have had reports of this vulnerability being exploited in the wild. This vulnerability affects Firefox...
9 affected packages
firefox, thunderbird, mozjs38, mozjs52, mozjs68...
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| firefox | — | Not affected | Not affected | Fixed | — |
| thunderbird | — | Not affected | Fixed | Fixed | — |
| mozjs38 | — | Not in release | Not in release | Not in release | Ignored |
| mozjs52 | — | Not in release | Not in release | Ignored | Ignored |
| mozjs68 | — | Not in release | Not in release | Ignored | — |
| mozjs78 | — | Not in release | Ignored | Not in release | — |
| mozjs91 | — | Not in release | Ignored | Not in release | — |
| mozjs102 | — | Ignored | Ignored | Not in release | — |
| mozjs115 | — | Ignored | Not in release | Not in release | — |
Some fixes available 2 of 13
Memory safety bugs present in Firefox 130, Firefox ESR 128.2, and Thunderbird 128.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run...
9 affected packages
firefox, thunderbird, mozjs38, mozjs52, mozjs68...
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| firefox | — | Not affected | Not affected | Fixed | — |
| thunderbird | — | Not affected | Fixed | Not in release | — |
| mozjs38 | — | Not in release | Not in release | Not in release | Needs evaluation |
| mozjs52 | — | Not in release | Not in release | Needs evaluation | Ignored |
| mozjs68 | — | Not in release | Not in release | Ignored | — |
| mozjs78 | — | Not in release | Ignored | Not in release | — |
| mozjs91 | — | Not in release | Ignored | Not in release | — |
| mozjs102 | — | Ignored | Ignored | Not in release | — |
| mozjs115 | — | Ignored | Not in release | Not in release | — |