Search CVE reports
111 – 120 of 2124 results
Some fixes available 2 of 13
A race condition could have led to private browsing tabs being opened in normal browsing windows. This could have resulted in a potential privacy leak. This vulnerability affects Firefox < 135, Firefox ESR < 128.7, Thunderbird <...
9 affected packages
thunderbird, firefox, mozjs38, mozjs52, mozjs68...
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
thunderbird | Not affected | Fixed | Not in release | — |
firefox | Not affected | Not affected | Fixed | — |
mozjs38 | Not in release | Not in release | Not in release | Needs evaluation |
mozjs52 | Not in release | Not in release | Needs evaluation | Ignored |
mozjs68 | Not in release | Not in release | Ignored | — |
mozjs78 | Not in release | Ignored | Not in release | — |
mozjs91 | Not in release | Ignored | Not in release | — |
mozjs102 | Ignored | Ignored | Not in release | — |
mozjs115 | Ignored | Not in release | Not in release | — |
Some fixes available 2 of 13
A race during concurrent delazification could have led to a use-after-free. This vulnerability affects Firefox < 135, Firefox ESR < 115.20, Firefox ESR < 128.7, Thunderbird < 128.7, and Thunderbird < 135.
9 affected packages
mozjs38, mozjs52, mozjs68, mozjs78, mozjs91...
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
mozjs38 | Not in release | Not in release | Not in release | Needs evaluation |
mozjs52 | Not in release | Not in release | Needs evaluation | Ignored |
mozjs68 | Not in release | Not in release | Ignored | — |
mozjs78 | Not in release | Ignored | Not in release | — |
mozjs91 | Not in release | Ignored | Not in release | — |
mozjs102 | Ignored | Ignored | Not in release | — |
mozjs115 | Ignored | Not in release | Not in release | — |
firefox | Not affected | Not affected | Fixed | — |
thunderbird | Not affected | Fixed | Not in release | — |
Some fixes available 2 of 13
A bug in WebAssembly code generation could have lead to a crash. It may have been possible for an attacker to leverage this to achieve code execution. This vulnerability affects Firefox < 135, Firefox ESR < 128.7, Thunderbird <...
9 affected packages
mozjs78, firefox, thunderbird, mozjs38, mozjs52...
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
mozjs78 | Not in release | Ignored | Not in release | — |
firefox | Not affected | Not affected | Fixed | — |
thunderbird | Not affected | Fixed | Not in release | — |
mozjs38 | Not in release | Not in release | Not in release | Needs evaluation |
mozjs52 | Not in release | Not in release | Needs evaluation | Ignored |
mozjs68 | Not in release | Not in release | Ignored | — |
mozjs91 | Not in release | Ignored | Not in release | — |
mozjs102 | Ignored | Ignored | Not in release | — |
mozjs115 | Ignored | Not in release | Not in release | — |
Some fixes available 2 of 13
An attacker could have caused a use-after-free via the Custom Highlight API, leading to a potentially exploitable crash. This vulnerability affects Firefox < 135, Firefox ESR < 115.20, Firefox ESR < 128.7, Thunderbird < 128.7, and...
9 affected packages
firefox, thunderbird, mozjs38, mozjs52, mozjs68...
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
firefox | Not affected | Not affected | Fixed | — |
thunderbird | Not affected | Fixed | Not in release | — |
mozjs38 | Not in release | Not in release | Not in release | Needs evaluation |
mozjs52 | Not in release | Not in release | Needs evaluation | Ignored |
mozjs68 | Not in release | Not in release | Ignored | — |
mozjs78 | Not in release | Ignored | Not in release | — |
mozjs91 | Not in release | Ignored | Not in release | — |
mozjs102 | Ignored | Ignored | Not in release | — |
mozjs115 | Ignored | Not in release | Not in release | — |
Some fixes available 2 of 13
An attacker could have caused a use-after-free via crafted XSLT data, leading to a potentially exploitable crash. This vulnerability affects Firefox < 135, Firefox ESR < 115.20, Firefox ESR < 128.7, Thunderbird < 128.7, and...
9 affected packages
mozjs68, mozjs78, mozjs91, mozjs102, mozjs115...
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
mozjs68 | Not in release | Not in release | Ignored | — |
mozjs78 | Not in release | Ignored | Not in release | — |
mozjs91 | Not in release | Ignored | Not in release | — |
mozjs102 | Ignored | Ignored | Not in release | — |
mozjs115 | Ignored | Not in release | Not in release | — |
firefox | Not affected | Not affected | Fixed | — |
thunderbird | Not affected | Fixed | Not in release | — |
mozjs38 | Not in release | Not in release | Not in release | Needs evaluation |
mozjs52 | Not in release | Not in release | Needs evaluation | Ignored |
Thunderbird displayed an incorrect sender address if the From field of an email used the invalid group name syntax that is described in CVE-2024-49040. This vulnerability affects Thunderbird < 128.7 and Thunderbird < 135.
1 affected package
thunderbird
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
thunderbird | Not affected | Fixed | Not in release | — |
Some fixes available 1 of 12
Memory safety bugs present in Firefox 133 and Thunderbird 133. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This...
9 affected packages
firefox, thunderbird, mozjs38, mozjs52, mozjs68...
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
firefox | Not affected | Not affected | Fixed | — |
thunderbird | Not affected | Not affected | Not in release | — |
mozjs38 | Not in release | Not in release | Not in release | Needs evaluation |
mozjs52 | Not in release | Not in release | Needs evaluation | Ignored |
mozjs68 | Not in release | Not in release | Ignored | — |
mozjs78 | Not in release | Ignored | Not in release | — |
mozjs91 | Not in release | Ignored | Not in release | — |
mozjs102 | Ignored | Ignored | Not in release | — |
mozjs115 | Ignored | Not in release | Not in release | — |
When using an invalid protocol scheme, an attacker could spoof the address bar. *Note: This issue only affected Android operating systems. Other operating systems are unaffected.* *Note: This issue is a different issue from...
2 affected packages
firefox, thunderbird
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
firefox | Not affected | Not affected | Not in release | — |
thunderbird | Not affected | Not affected | Not in release | — |
Under certain circumstances, a user opt-in setting that Focus should require authentication before use could have been be bypassed. This vulnerability affects Firefox < 134.
2 affected packages
firefox, thunderbird
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
firefox | Not affected | Not affected | Not in release | — |
thunderbird | Not affected | Not affected | Not in release | — |
When redirecting to an invalid protocol scheme, an attacker could spoof the address bar. *Note: This issue only affected Android operating systems. Other operating systems are unaffected.* This vulnerability affects Firefox < 134.
2 affected packages
firefox, thunderbird
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
firefox | Not affected | Not affected | Not in release | — |
thunderbird | Not affected | Not affected | Not in release | — |