Search for packages
purl | pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1 |
Next non-vulnerable version | 128.13.0esr-1~deb12u1 |
Latest non-vulnerable version | 128.13.0esr-1~deb12u1 |
Risk | 10.0 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-16e7-bj17-c7dg
Aliases: CVE-2024-8383 |
Firefox normally asks for confirmation before asking the operating system to find an application to handle a scheme that the browser does not support. It did not ask before doing so for the Usenet-related schemes news: and snews:. Since most operating systems don't have a trusted newsreader installed by default, an unscrupulous program that the user downloaded could register itself as a handler. The website that served the application download could then launch that application at will. |
Affected by 75 other vulnerabilities. |
VCID-1axs-gkas-57at
Aliases: CVE-2024-10461 |
In multipart/x-mixed-replace responses, Content-Disposition: attachment in the response header was not respected and did not force a download, which could allow XSS attacks. |
Affected by 27 other vulnerabilities. |
VCID-1fxu-dq7g-mqfw
Aliases: CVE-2025-1012 |
A race during concurrent delazification could have led to a use-after-free. |
Affected by 27 other vulnerabilities. |
VCID-1q61-xygj-z3c1
Aliases: CVE-2025-6425 |
An attacker who enumerated resources from the WebCompat extension could have obtained a persistent UUID that identified the browser, and persisted between containers and normal/private browsing mode, but not profiles. |
Affected by 0 other vulnerabilities. |
VCID-24jc-r9xj-93fs
Aliases: CVE-2025-4083 |
A process isolation vulnerability in Firefox stemmed from improper handling of javascript: URIs, which could allow content to execute in the top-level document's process instead of the intended frame, potentially enabling a sandbox escape. |
Affected by 0 other vulnerabilities. |
VCID-2gvb-9ecp-n3a9
Aliases: CVE-2025-1932 |
An inconsistent comparator in xslt/txNodeSorter could have resulted in potentially exploitable out-of-bounds access. Only affected version 122 and later. |
Affected by 27 other vulnerabilities. |
VCID-2js5-w357-qfd7
Aliases: CVE-2024-10464 |
Repeated writes to history interface attributes could have been used to cause a Denial of Service condition in the browser. This was addressed by introducing rate-limiting to this API. |
Affected by 27 other vulnerabilities. |
VCID-2st9-4ff5-kuf9
Aliases: CVE-2025-8030 |
Insufficient escaping in the “Copy as cURL” feature could potentially be used to trick a user into executing unexpected code. |
Affected by 0 other vulnerabilities. |
VCID-3p6h-zmbc-gbgq
Aliases: CVE-2025-8029 |
Thunderbird executed javascript: URLs when used in object and embed tags. |
Affected by 0 other vulnerabilities. |
VCID-3rnm-313t-8bf8
Aliases: CVE-2024-11696 |
The application failed to account for exceptions thrown by the `loadManifestFromFile` method during add-on signature verification. This flaw, triggered by an invalid or unsupported extension manifest, could have caused runtime errors that disrupted the signature validation process. As a result, the enforcement of signature validation for unrelated add-ons may have been bypassed. Signature validation in this context is used to ensure that third-party applications on the user's computer have not tampered with the user's extensions, limiting the impact of this issue. |
Affected by 27 other vulnerabilities. |
VCID-456s-g2t4-uqfy
Aliases: CVE-2025-3029 |
A crafted URL containing specific Unicode characters could have hidden the true origin of the page, resulting in a potential spoofing attack. |
Affected by 27 other vulnerabilities. |
VCID-4g4j-e7x5-zfhs
Aliases: CVE-2025-6430 |
When a file download is specified via the Content-Disposition header, that directive would be ignored if the file was included via a <embed> or <object> tag, potentially making a website vulnerable to a cross-site scripting attack. |
Affected by 0 other vulnerabilities. |
VCID-52ca-d5he-sqdq
Aliases: CVE-2024-11694 |
Enhanced Tracking Protection's Strict mode may have inadvertently allowed a CSP `frame-src` bypass and DOM-based XSS through the Google SafeFrame shim in the Web Compatibility extension. This issue could have exposed users to malicious frames masquerading as legitimate content. |
Affected by 27 other vulnerabilities. |
VCID-62bd-1g3u-cqhp
Aliases: CVE-2025-8028 |
On arm64, a WASM br_table instruction with a lot of entries could lead to the label being too far from the instruction causing truncation and incorrect computation of the branch address. |
Affected by 0 other vulnerabilities. |
VCID-6xvd-y4x1-4bh4
Aliases: CVE-2025-1016 |
Memory safety bugs present in Firefox 134, Thunderbird 134, Firefox ESR 115.19, Firefox ESR 128.6, Thunderbird 115.19, and Thunderbird 128.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. |
Affected by 27 other vulnerabilities. |
VCID-788v-5q27-nkds
Aliases: CVE-2024-9394 |
An attacker could, via a specially crafted multipart response, execute arbitrary JavaScript under the `resource://devtools` origin. This could allow them to access cross-origin JSON content. This access is limited to "same site" documents by the Site Isolation feature on desktop clients, but full cross-origin access is possible on Android versions. |
Affected by 27 other vulnerabilities. |
VCID-84hu-vuht-mfch
Aliases: CVE-2025-1935 |
A web page could trick a user into setting that site as the default handler for a custom URL protocol. |
Affected by 27 other vulnerabilities. |
VCID-8rs8-11yk-akfy
Aliases: CVE-2025-8033 |
The JavaScript engine did not handle closed generators correctly and it was possible to resume them leading to a nullptr deref. |
Affected by 0 other vulnerabilities. |
VCID-8ywr-81f7-aqdb
Aliases: CVE-2024-10465 |
A clipboard "paste" button could persist across tabs which allowed a spoofing attack. |
Affected by 27 other vulnerabilities. |
VCID-9qgx-e2kh-uyew
Aliases: CVE-2025-8031 |
The username:password part was not correctly stripped from URLs in CSP reports potentially leaking HTTP Basic Authentication credentials. |
Affected by 0 other vulnerabilities. |
VCID-b5c1-k9za-cqfw
Aliases: CVE-2025-0243 |
Memory safety bugs present in Firefox 133, Thunderbird 133, Firefox ESR 128.5, and Thunderbird 128.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. |
Affected by 27 other vulnerabilities. |
VCID-b8um-wr1c-sqa3
Aliases: CVE-2024-8382 |
Internal browser event interfaces were exposed to web content when privileged EventHandler listener callbacks ran for those events. Web content that tried to use those interfaces would not be able to use them with elevated privileges, but their presence would indicate certain browser features had been used, such as when a user opened the Dev Tools console. |
Affected by 75 other vulnerabilities. |
VCID-bb9a-bqg4-8ufy
Aliases: CVE-2025-3030 |
Memory safety bugs present in Firefox 136, Thunderbird 136, Firefox ESR 128.8, and Thunderbird 128.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. |
Affected by 27 other vulnerabilities. |
VCID-bj49-41v3-q3bu
Aliases: CVE-2024-10458 |
A permission leak could have occurred from a trusted site to an untrusted site via embed or object elements. |
Affected by 27 other vulnerabilities. |
VCID-cntf-rqbm-jfd1
Aliases: CVE-2025-1938 |
Memory safety bugs present in Firefox 135, Thunderbird 135, Firefox ESR 128.7, and Thunderbird 128.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. |
Affected by 27 other vulnerabilities. |
VCID-edu5-4u9p-hka6
Aliases: CVE-2024-11699 |
Memory safety bugs present in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. |
Affected by 27 other vulnerabilities. |
VCID-ek9g-1ur7-vud4
Aliases: CVE-2025-5263 |
Error handling for script execution was incorrectly isolated from web content, which could have allowed cross-origin leak attacks. |
Affected by 0 other vulnerabilities. |
VCID-epgc-nd77-wyht
Aliases: CVE-2024-11695 |
A crafted URL containing Arabic script and whitespace characters could have hidden the true origin of the page, resulting in a potential spoofing attack. |
Affected by 27 other vulnerabilities. |
VCID-fdr6-qypx-1uhr
Aliases: CVE-2025-4919 |
An attacker was able to perform an out-of-bounds read or write on a JavaScript object by confusing array index sizes. |
Affected by 0 other vulnerabilities. |
VCID-fhwy-ptz6-mqbj
Aliases: CVE-2024-10462 |
Truncation of a long URL could have allowed origin spoofing in a permission prompt. |
Affected by 27 other vulnerabilities. |
VCID-fp1b-9hp1-jfaj
Aliases: CVE-2024-11697 |
When handling keypress events, an attacker may have been able to trick a user into bypassing the "Open Executable File?" confirmation dialog. This could have led to malicious code execution. |
Affected by 27 other vulnerabilities. |
VCID-g2eh-3utg-f7cn
Aliases: CVE-2025-4918 |
An attacker was able to perform an out-of-bounds read or write on a JavaScript `Promise` object. |
Affected by 0 other vulnerabilities. |
VCID-g76u-agqq-eqca
Aliases: CVE-2025-6429 |
Thunderbird could have incorrectly parsed a URL and rewritten it to the youtube.com domain when parsing the URL specified in an embed tag. This could have bypassed website security checks that restricted which domains users were allowed to embed. |
Affected by 0 other vulnerabilities. |
VCID-gf4f-pq9k-kugc
Aliases: CVE-2025-6424 |
A use-after-free in FontFaceSet resulted in a potentially exploitable crash. |
Affected by 0 other vulnerabilities. |
VCID-gw8f-56ya-fyaj
Aliases: CVE-2025-5283 |
A double-free could have occurred in `vpx_codec_enc_init_multi` after a failed allocation when initializing the encoder for WebRTC. This could have caused memory corruption and a potentially exploitable crash. |
Affected by 0 other vulnerabilities. |
VCID-h3um-uvwe-9udy
Aliases: CVE-2025-4087 |
A vulnerability was identified in Thunderbird where XPath parsing could trigger undefined behavior due to missing null checks during attribute access. This could lead to out-of-bounds read access and potentially, memory corruption. |
Affected by 0 other vulnerabilities. |
VCID-hvtf-ukk7-4ydc
Aliases: CVE-2025-0241 |
When segmenting specially crafted text, segmentation would corrupt memory leading to a potentially exploitable crash. |
Affected by 27 other vulnerabilities. |
VCID-hw69-ahun-wbez
Aliases: CVE-2025-0238 |
Assuming a controlled failed memory allocation, an attacker could have caused a use-after-free, leading to a potentially exploitable crash. |
Affected by 27 other vulnerabilities. |
VCID-k2g8-b3u6-63aj
Aliases: CVE-2025-8027 |
On 64-bit platforms IonMonkey-JIT only wrote 32 bits of the 64-bit return value space on the stack. Baseline-JIT, however, read the entire 64 bits. |
Affected by 0 other vulnerabilities. |
VCID-kd1q-6ntp-t3ct
Aliases: CVE-2025-0239 |
When using Alt-Svc, ALPN did not properly validate certificates when the original server is redirecting to an insecure site. |
Affected by 27 other vulnerabilities. |
VCID-kwpw-wry4-huah
Aliases: CVE-2025-1936 |
jar: URLs retrieve local file content packaged in a ZIP archive. The null and everything after it was ignored when retrieving the content from the archive, but the fake extension after the null was used to determine the type of content. This could have been used to hide code in a web extension disguised as something else like an image. |
Affected by 27 other vulnerabilities. |
VCID-m8je-z16e-zyc7
Aliases: CVE-2024-10466 |
By sending a specially crafted push message, a remote server could have hung the parent process, causing the browser to become unresponsive. |
Affected by 27 other vulnerabilities. |
VCID-mbzx-53sb-kfgr
Aliases: CVE-2024-8384 |
The JavaScript garbage collector could mis-color cross-compartment objects if OOM conditions were detected at the right point between two passes. This could have led to memory corruption. |
Affected by 75 other vulnerabilities. |
VCID-mru8-8xhq-9ued
Aliases: CVE-2024-10459 |
An attacker could have caused a use-after-free when accessibility was enabled, leading to a potentially exploitable crash. |
Affected by 27 other vulnerabilities. |
VCID-nt71-ejhd-eygx
Aliases: CVE-2024-9392 |
A compromised content process could have allowed for the arbitrary loading of cross-origin pages. |
Affected by 27 other vulnerabilities. |
VCID-ntwt-rzyj-7bcs
Aliases: CVE-2025-1931 |
It was possible to cause a use-after-free in the content process side of a WebTransport connection, leading to a potentially exploitable crash. |
Affected by 27 other vulnerabilities. |
VCID-nu94-urex-sfat
Aliases: CVE-2025-1017 |
Memory safety bugs present in Firefox 134, Thunderbird 134, Firefox ESR 128.6, and Thunderbird 128.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. |
Affected by 27 other vulnerabilities. |
VCID-p1rd-pjrq-w3h2
Aliases: CVE-2024-11704 |
A double-free issue could have occurred in `sec_pkcs7_decoder_start_decrypt()` when handling an error path. Under specific conditions, the same symmetric key could have been freed twice, potentially leading to memory corruption. |
Affected by 27 other vulnerabilities. |
VCID-q5zv-7zk6-m3hu
Aliases: CVE-2024-43097 |
In resizeToAtLeast of SkRegion.cpp, there was a possible out of bounds write due to an integer overflow |
Affected by 27 other vulnerabilities. |
VCID-qa68-kdqv-tucm
Aliases: CVE-2024-9401 |
Memory safety bugs present in Firefox 130, Firefox ESR 115.15, Firefox ESR 128.2, and Thunderbird 128.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. |
Affected by 27 other vulnerabilities. |
VCID-qd17-z9b8-3bgx
Aliases: CVE-2024-9680 |
An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines. We have had reports of this vulnerability being exploited in the wild. |
Affected by 27 other vulnerabilities. |
VCID-qst2-ktgg-jkfp
Aliases: CVE-2025-8034 |
Memory safety bugs present in Firefox ESR 115.25, Firefox ESR 128.12, Thunderbird ESR 128.12, Firefox ESR 140.0, Thunderbird ESR 140.0, Firefox 140 and Thunderbird 140. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. |
Affected by 0 other vulnerabilities. |
VCID-r6kn-rvn1-4uaj
Aliases: CVE-2024-10460 |
The origin of an external protocol handler prompt could have been obscured using a data: URL within an iframe. |
Affected by 27 other vulnerabilities. |
VCID-r6r1-du8s-xbhw
Aliases: CVE-2025-8035 |
Memory safety bugs present in Firefox ESR 128.12, Thunderbird ESR 128.12, Firefox ESR 140.0, Thunderbird ESR 140.0, Firefox 140 and Thunderbird 140. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. |
Affected by 0 other vulnerabilities. |
VCID-rky1-8buu-bqbw
Aliases: CVE-2025-3028 |
JavaScript code running while transforming a document with the XSLTProcessor could lead to a use-after-free. |
Affected by 27 other vulnerabilities. |
VCID-rrgb-3n34-k7fr
Aliases: CVE-2025-1011 |
A bug in WebAssembly code generation could have lead to a crash. It may have been possible for an attacker to leverage this to achieve code execution. |
Affected by 27 other vulnerabilities. |
VCID-rwt3-2mbq-2kew
Aliases: CVE-2025-0240 |
Parsing a JavaScript module as JSON could under some circumstances cause cross-compartment access, which may result in a use-after-free. |
Affected by 27 other vulnerabilities. |
VCID-s3qb-a9z3-tkeq
Aliases: CVE-2024-9393 |
An attacker could, via a specially crafted multipart response, execute arbitrary JavaScript under the `resource://pdf.js` origin. This could allow them to access cross-origin PDF content. This access is limited to "same site" documents by the Site Isolation feature on desktop clients, but full cross-origin access is possible on Android versions. |
Affected by 27 other vulnerabilities. |
VCID-s4yd-wr7v-9qdn
Aliases: CVE-2025-1014 |
Certificate length was not properly checked when added to a certificate store. In practice only trusted data was processed. |
Affected by 27 other vulnerabilities. |
VCID-s9cf-25mx-dfg4
Aliases: CVE-2025-1934 |
It was possible to interrupt the processing of a RegExp bailout and run additional JavaScript, potentially triggering garbage collection when the engine was not expecting it. |
Affected by 27 other vulnerabilities. |
VCID-sz4n-5y9b-4fdh
Aliases: CVE-2025-5266 |
Script elements loading cross-origin resources generated load and error events which leaked information enabling XS-Leaks attacks. |
Affected by 0 other vulnerabilities. |
VCID-taja-fqcq-auc9
Aliases: CVE-2025-1013 |
A race condition could have led to private browsing tabs being opened in normal browsing windows. This could have resulted in a potential privacy leak. |
Affected by 27 other vulnerabilities. |
VCID-u8zp-hwjv-8fgf
Aliases: CVE-2025-5269 |
Memory safety bug present in Firefox ESR 128.10, and Thunderbird 128.10. This bug showed evidence of memory corruption and we presume that with enough effort this could have been exploited to run arbitrary code. |
Affected by 0 other vulnerabilities. |
VCID-ufc9-wufv-ubgc
Aliases: CVE-2025-4091 |
Memory safety bugs present in Firefox 137, Thunderbird 137, Firefox ESR 128.9, and Thunderbird 128.9. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. |
Affected by 0 other vulnerabilities. |
VCID-ufen-1skg-17b2
Aliases: CVE-2025-5268 |
Memory safety bugs present in Firefox 138, Thunderbird 138, Firefox ESR 128.10, and Thunderbird 128.10. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. |
Affected by 0 other vulnerabilities. |
VCID-uhss-ehje-9bdp
Aliases: CVE-2025-1010 |
An attacker could have caused a use-after-free via the Custom Highlight API, leading to a potentially exploitable crash. |
Affected by 27 other vulnerabilities. |
VCID-utqu-6qzq-hudx
Aliases: CVE-2025-5267 |
A clickjacking vulnerability could have been used to trick a user into leaking saved payment card details to a malicious page. |
Affected by 0 other vulnerabilities. |
VCID-uzuj-bduh-kqdd
Aliases: CVE-2024-10463 |
Video frames could have been leaked between origins in some situations. |
Affected by 27 other vulnerabilities. |
VCID-vabp-m3k4-wqhz
Aliases: CVE-2025-5264 |
Due to insufficient escaping of the newline character in the “Copy as cURL” feature, an attacker could trick a user into using this command, potentially leading to local code execution on the user's system. |
Affected by 0 other vulnerabilities. |
VCID-vpdd-7zz2-hyak
Aliases: CVE-2025-1009 |
An attacker could have caused a use-after-free via crafted XSLT data, leading to a potentially exploitable crash. |
Affected by 27 other vulnerabilities. |
VCID-wrjz-8amf-xbgf
Aliases: CVE-2025-1937 |
Memory safety bugs present in Firefox 135, Thunderbird 135, Firefox ESR 115.20, Firefox ESR 128.7, and Thunderbird 128.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. |
Affected by 27 other vulnerabilities. |
VCID-wzr2-5k1q-yybx
Aliases: CVE-2025-8032 |
XSLT document loading did not correctly propagate the source document which bypassed its CSP. |
Affected by 0 other vulnerabilities. |
VCID-xeze-dewx-27f1
Aliases: CVE-2025-0242 |
Memory safety bugs present in Firefox 133, Thunderbird 133, Firefox ESR 115.18, Firefox ESR 128.5, Thunderbird 115.18, and Thunderbird 128.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. |
Affected by 27 other vulnerabilities. |
VCID-xrqw-p22q-6fc8
Aliases: CVE-2024-10467 |
Memory safety bugs present in Firefox 131, Firefox ESR 128.3, and Thunderbird 128.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. |
Affected by 27 other vulnerabilities. |
VCID-yf1w-5x6s-7ub2
Aliases: CVE-2024-11692 |
An attacker could cause a select dropdown to be shown over another tab; this could have led to user confusion and possible spoofing attacks. |
Affected by 27 other vulnerabilities. |
VCID-yuaj-zgum-17fj
Aliases: CVE-2025-0237 |
The WebChannel API, which is used to transport various information across processes, did not check the sending principal but rather accepted the principal being sent. This could have led to privilege escalation attacks. |
Affected by 27 other vulnerabilities. |
VCID-z1dk-1rqd-r3hw
Aliases: CVE-2024-8381 |
A potentially exploitable type confusion could be triggered when looking up a property name on an object being used as the with environment. |
Affected by 75 other vulnerabilities. |
VCID-z9bt-bsqy-rkc1
Aliases: CVE-2025-1933 |
On 64-bit CPUs, when the JIT compiles WASM i32 return values they can pick up bits from left over memory. This can potentially cause them to be treated as a different type. |
Affected by 27 other vulnerabilities. |
VCID-zuwe-8m4p-u7hr
Aliases: CVE-2025-4093 |
Memory safety bug present in Firefox ESR 128.9, and Thunderbird 128.9. This bug showed evidence of memory corruption and we presume that with enough effort this could have been exploited to run arbitrary code. |
Affected by 0 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
VCID-11ym-6m1p-k3hg | When resolving a symlink such as file:///proc/self/fd/1, an error message may be produced where the symlink was resolved to a string containing unitialized memory in the buffer. *This bug only affects Thunderbird on Unix-based operated systems (Android, Linux, MacOS). Windows is unaffected.* |
CVE-2022-45412
|
VCID-1bgz-ch6v-4uaa | Memory safety bugs present in Firefox 116, Firefox ESR 102.14, Firefox ESR 115.1, Thunderbird 102.14, and Thunderbird 115.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. |
CVE-2023-4584
|
VCID-1zaj-dhug-bffr | An unchecked return value in TLS handshake code could have caused a potentially exploitable crash. |
CVE-2024-0743
|
VCID-1zj8-9xa4-eydr | Memory safety bugs present in Firefox 119, Firefox ESR 115.4, and Thunderbird 115.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. |
CVE-2023-6212
|
VCID-2arp-fdss-nkbc | Memory safety bugs present in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. |
CVE-2024-6604
|
VCID-2h4q-bk7s-wfdh | It was possible for a web extension with minimal permissions to create a StreamFilter which could be used to read and modify the response body of requests on any site. |
CVE-2024-7525
|
VCID-2jmt-qszf-1uhc | GetBoundName could return the wrong version of an object when JIT optimizations were applied. |
CVE-2024-3852
|
VCID-2kxr-feaw-87a8 | A bug in popup notifications delay calculation could have made it possible for an attacker to trick a user into granting permissions. |
CVE-2023-4047
|
VCID-2kz3-fkpu-8fbh | Mozilla developers and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 108 and Firefox ESR 102.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. |
CVE-2023-23605
|
VCID-2r2w-tzaa-u7bf | Memory safety bugs present in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. |
CVE-2024-0755
|
VCID-2w1h-9zv3-3faf | If the browser.privatebrowsing.autostart preference is enabled, IndexedDB files were not properly deleted when the window was closed. This preference is disabled by default in Firefox. |
CVE-2024-4767
|
VCID-2zx4-79a6-dubx | Mozilla developers Nika Layzell, Timothy Nikkel, Sebastian Hengst, Andreas Pehrson, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 104 and Firefox ESR 102.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. |
CVE-2022-40962
|
VCID-3f36-r4k1-d7ad | EncryptingOutputStream was susceptible to exposing uninitialized data. This issue could only be abused in order to write data to a local disk which may have implications for private browsing mode. |
CVE-2023-6865
|
VCID-3faq-rsnj-tuam | By injecting a cookie with certain special characters, an attacker on a shared subdomain which is not a secure context could set and thus overwrite cookies from a secure context, leading to session fixation and other attacks. |
CVE-2022-40958
|
VCID-477z-z5bh-auf4 | The WebGL DrawElementsInstanced method was susceptible to a heap buffer overflow when used on systems with the Mesa VM driver. This issue could allow an attacker to perform remote code execution and sandbox escape. |
CVE-2023-6856
|
VCID-499x-gk1r-rfe8 | When handling the filename directive in the Content-Disposition header, the filename would be truncated if the filename contained a NULL character. This could have led to reflected file download attacks potentially tricking users to install malware. |
CVE-2023-29539
|
VCID-4aay-53k1-rbfm | In multiple cases browser prompts could have been obscured by popups controlled by content. These could have led to potential user confusion and spoofing attacks. |
CVE-2023-32205
|
VCID-4ae3-eszf-1khm | A use-after-free was identified in the nsDNSService::Init. This issue appears to manifest rarely during start-up. |
CVE-2023-6862
|
VCID-4jxu-hf9d-hycf | When the number of cookies per domain was exceeded in document.cookie, the actual cookie jar sent to the host was no longer consistent with expected cookie jar state. This could have caused requests to be sent with some cookies missing. |
CVE-2023-4055
|
VCID-4mvt-n1hy-8kdc | A website could have obscured the fullscreen notification by using a combination of window.open, fullscreen requests, window.name assignments, and setInterval calls. This could have led to user confusion and possible spoofing attacks. |
CVE-2023-29533
|
VCID-4r46-agvr-83fc | Sometimes, when invalidating JIT code while following an iterator, the newly generated code could be overwritten incorrectly. This could lead to a potentially exploitable crash. |
CVE-2023-25751
|
VCID-55kp-c84f-m3ft | In an out-of-memory scenario an allocation could fail but free would have been called on the pointer afterwards leading to memory corruption. |
CVE-2024-6603
|
VCID-565q-4xhu-tbge | Navigations were being allowed when dragging a URL from a cross-origin iframe into the same tab which could lead to website spoofing attacks |
CVE-2023-23601
|
VCID-5gh4-rdu5-kfdv | Cross-Site Tracing occurs when a server will echo a request back via the Trace method, allowing an XSS attack to access to authorization headers and cookies inaccessible to JavaScript (such as cookies protected by HTTPOnly). To mitigate this attack, browsers placed limits on fetch() and XMLHttpRequest; however some webservers have implemented non-standard headers such as X-Http-Method-Override that override the HTTP method, and made this attack possible again. Thunderbird has applied the same mitigations to the use of this and similar headers. |
CVE-2022-45411
|
VCID-5u1c-csvv-2qbj | When saving a page to PDF, certain font styles could have led to a potential use-after-free crash. |
CVE-2024-4770
|
VCID-5zmt-sp9b-77cd | Memory safety bugs present in Firefox 117, Firefox ESR 115.2, and Thunderbird 115.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. |
CVE-2023-5176
|
VCID-6362-sfat-cfgb | Editor code failed to check an attribute value. This could have led to an out-of-bounds read. |
CVE-2024-7522
|
VCID-65g7-4xah-fqcc | A missing delay on when pointer lock was used could have allowed a malicious page to trick a user into granting permissions. |
CVE-2024-2611
|
VCID-65r6-qcnu-9kcp | In some code patterns the JIT incorrectly optimized switch statements and generated code with out-of-bounds-reads. |
CVE-2024-3854
|
VCID-67me-cepz-hbcz | Ownership mismanagement led to a use-after-free in ReadableByteStreams |
CVE-2023-6207
|
VCID-69ns-7ven-pufe | A missing delay in popup notifications could have made it possible for an attacker to trick a user into granting permissions. |
CVE-2023-32207
|
VCID-6b7c-u6uu-qqgb | Firefox did not properly handle downloads of files ending in .desktop, which can be interpreted to run attacker-controlled commands. *This bug only affects Firefox for Linux on certain Distributions. Other operating systems are unaffected, and Mozilla is unable to enumerate all affected Linux Distributions.* |
CVE-2023-29541
|
VCID-6jdq-sabr-fkf8 | The permission prompt input delay could expire while the window is not in focus. This makes it vulnerable to clickjacking by malicious websites. |
CVE-2024-2609
|
VCID-6k7g-x3z2-rucu | Offscreen Canvas did not properly track cross-origin tainting, which could be used to access image data from another site in violation of same-origin policy. |
CVE-2024-5693
|
VCID-6xec-6jsv-vbex | A race condition could lead to a cross-origin container obtaining permissions of the top-level origin. |
CVE-2024-6601
|
VCID-76ra-v38d-13hb | Mozilla developers Philipp and Gabriele Svelto reported memory safety bugs present in Thunderbird 102.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. |
CVE-2023-25746
|
VCID-77xv-r9xu-b3bh | Incorrect code generation could have led to unexpected numeric conversions and potential undefined behavior.*Note:* This issue only affects 32-bit ARM devices. |
CVE-2024-1552
|
VCID-78e7-r2pe-cyd3 | Mozilla developers and community members Gabriele Svelto, Andrew McCreight, the Mozilla Fuzzing Team, Sean Feng, and Sebastian Hengst reported memory safety bugs present in Thunderbird 102.11. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. |
CVE-2023-34416
|
VCID-7s8d-r67g-6feh | A mismatch between allocator and deallocator could have led to memory corruption. |
CVE-2024-6602
|
VCID-7uqa-qwtn-67bk | Module load requests that failed were not being checked as to whether or not they were cancelled causing a use-after-free in ScriptLoadContext. |
CVE-2023-25739
|
VCID-7z8m-n6jb-afb3 | An error in the ECMA-262 specification relating to Async Generators could have resulted in a type confusion, potentially leading to memory corruption and an exploitable crash. |
CVE-2024-7652
|
VCID-82f7-m3ue-a7d7 | A wrong lowering instruction in the ARM64 Ion compiler resulted in a wrong optimization result. |
CVE-2023-29548
|
VCID-84km-m9pm-tqcf | Unexpected data returned from the Safe Browsing API could have led to memory corruption and a potentially exploitable crash. |
CVE-2023-1945
|
VCID-8jvs-j6k5-hfd1 | Memory safety bugs present in Firefox 115, Firefox ESR 115.0, Firefox ESR 102.13, Thunderbird 115.0, and Thunderbird 102.13. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. |
CVE-2023-4056
|
VCID-8nzn-yecz-syab | A malicious devtools extension could have been used to escalate privileges. |
CVE-2024-0751
|
VCID-9eqa-kuhe-gkf6 | Unexpected marking work at the start of sweeping could have led to a use-after-free. |
CVE-2024-7527
|
VCID-9gkm-pfqg-ckgv | The ShutdownObserver() was susceptible to potentially undefined behavior due to its reliance on a dynamic type that lacked a virtual destructor. |
CVE-2023-6863
|
VCID-9rrk-1dsa-5kdp | A bug in popup notifications delay calculation could have made it possible for an attacker to trick a user into granting permissions. |
CVE-2024-0750
|
VCID-9sra-duet-zqc7 | A missing check related to tex units could have led to a use-after-free and potentially exploitable crash. |
CVE-2022-46880
|
VCID-aagd-vwg4-wud4 | Inconsistent data in instruction and data cache when creating wasm code could lead to a potentially exploitable crash.*This bug only affects Firefox on ARM64 platforms.* |
CVE-2022-40957
|
VCID-avr4-9nty-5qah | A background script invoking requestFullscreen and then blocking the main thread could force the browser into fullscreen mode indefinitely, resulting in potential user confusion or spoofing attacks. |
CVE-2023-25730
|
VCID-b9rn-tgbt-byaa | Freeing arbitrary nsIInputStream's on a different thread than creation could have led to a use-after-free and potentially exploitable crash. |
CVE-2022-45405
|
VCID-bgpq-dkr2-nuem | Certain types of allocations were missing annotations that, if the Garbage Collector was in a specific state, could have lead to memory corruption and a potentially exploitable crash. |
CVE-2022-42928
|
VCID-bq5r-ay4d-vqay | It was possible to cause the use of a MessagePort after it had already been freed, which could potentially have led to an exploitable crash. |
CVE-2023-6205
|
VCID-brb2-tscz-57af | A website could have obscured the fullscreen notification by using a dropdown select input element. This could have led to user confusion and possible spoofing attacks. |
CVE-2024-1548
|
VCID-bsqs-5fbh-ckf8 | A website could have obscured the fullscreen notification by using a URL with a scheme handled by an external program, such as a mailto URL. This could have led to user confusion and possible spoofing attacks. |
CVE-2023-37207
|
VCID-bxfd-9arp-b7ez | Incomplete WebAssembly exception handing could have led to a use-after-free. |
CVE-2024-7521
|
VCID-crtm-ej6s-6yc7 | Keyboard events reference strings like "KeyA" that were at fixed, known, and widely-spread addresses. Cache-based timing attacks such as Prime+Probe could have possibly figured out which keys were being pressed. |
CVE-2022-45416
|
VCID-csn1-8t88-jubx | On 32-bit versions there were integer-overflows that led to an out-of-bounds-read that potentially could be triggered by a malformed OpenType font. |
CVE-2024-3859
|
VCID-cx3t-xzv3-33df | The garbage collector could have been aborted in several states and zones and GCRuntime::finishCollection may not have been called, leading to a use-after-free and potentially exploitable crash |
CVE-2022-45409
|
VCID-d1vh-fmzd-zfh3 | Concurrent use of the URL parser with non-UTF-8 data was not thread-safe. This could lead to a use-after-free causing a potentially exploitable crash. |
CVE-2022-40960
|
VCID-d3pk-6wxx-ebbx | There was no limit to the number of HTTP/2 CONTINUATION frames that would be processed. A server could abuse this to create an Out of Memory condition in the browser. |
CVE-2024-3302
|
VCID-d6nu-5nhv-ubee | When creating a callback over IPC for showing the Color Picker window, multiple of the same callbacks could have been created at a time and eventually all simultaneously destroyed as soon as one of the callbacks finished. This could have led to a use-after-free causing a potentially exploitable crash. |
CVE-2023-4574
|
VCID-dbx6-dxxe-sycy | Memory corruption in the networking stack could have led to a potentially exploitable crash. |
CVE-2024-5702
|
VCID-dc3v-4axp-73ga | Excel .xll add-in files did not have a blocklist entry in Firefox's executable blocklist which allowed them to be downloaded without any warning of their potential harm. |
CVE-2023-4581
|
VCID-dsgp-323t-ruem | An attacker could have positioned a datalist element to obscure the address bar. |
CVE-2023-32212
|
VCID-dspu-5fu3-w3f3 | By manipulating the text in an <input> tag, an attacker could have caused corrupt memory leading to a potentially exploitable crash. |
CVE-2024-5696
|
VCID-dxc3-qbwn-zye5 | When using X11, text selected by the page using the Selection API was erroneously copied into the primary selection, a temporary storage not unlike the clipboard.*This bug only affects Firefox on X11. Other systems are unaffected.* |
CVE-2023-6208
|
VCID-e17a-uz9k-yug1 | The Content-Security-Policy-Report-Only header could allow an attacker to leak a child iframe's unredacted URI when interaction with that iframe triggers a redirect. |
CVE-2023-25728
|
VCID-e2u4-sjah-tbc6 | During iframe navigation, certain pages did not have their FeaturePolicy fully initialized leading to a bypass that leaked device permissions into untrusted subdocuments. |
CVE-2022-40959
|
VCID-e7qh-1exk-vygd | During Ion compilation, a Garbage Collection could have resulted in a use-after-free condition, allowing an attacker to write two NUL bytes, and cause a potentially exploitable crash. |
CVE-2023-5171
|
VCID-esrv-1t7e-nueq | The error page for sites with invalid TLS certificates was missing the activation-delay Thunderbird uses to protect prompts and permission dialogs from attacks that exploit human response time delays. If a malicious page elicited user clicks in precise locations immediately before navigating to a site with a certificate error and made the renderer extremely busy at the same time, it could create a gap between when the error page was loaded and when the display actually refreshed. With the right timing the elicited clicks could land in that gap and activate the button that overrides the certificate error for that site. |
CVE-2023-34414
|
VCID-etcj-p5fs-rkdd | Memory safety bugs present in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. |
CVE-2024-2614
|
VCID-f16k-2eg5-t7gp | Memory safety bugs present in Firefox 118, Firefox ESR 115.3, and Thunderbird 115.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. |
CVE-2023-5730
|
VCID-f2k6-k8fj-ayhv | In specific HSTS configurations an attacker could have bypassed HSTS on a subdomain. |
CVE-2024-0753
|
VCID-f4zz-psm3-7qaa | Memory safety bugs present in Firefox 114, Firefox ESR 102.12, and Thunderbird 102.12. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. |
CVE-2023-37211
|
VCID-f8e3-hcgq-xuh8 | Through a series of popups that reuse windowName, an attacker can cause a window to go fullscreen without the user seeing the notification prompt, resulting in potential user confusion or spoofing attacks. |
CVE-2022-45408
|
VCID-f9gn-szwb-9yez | It was possible for certain browser prompts and dialogs to be activated or dismissed unintentionally by the user due to an insufficient activation-delay. |
CVE-2023-5721
|
VCID-feje-rtmv-3bhb | When a parent page loaded a child in an iframe with unsafe-inline, the parent Content Security Policy could have overridden the child Content Security Policy. |
CVE-2024-0747
|
VCID-ffsq-gj42-aka8 | When importing resources using Web Workers, error messages would distinguish the difference between application/javascript responses and non-script responses. This could have been abused to learn information cross-origin. |
CVE-2024-4769
|
VCID-fnfk-qv8d-gkfw | An out of date library (libusrsctp) contained vulnerabilities that could potentially be exploited. |
CVE-2022-46871
|
VCID-gp61-4yye-5qct | Drivers are not always robust to extremely large draw calls and in some cases this scenario could have led to a crash. |
CVE-2023-5724
|
VCID-gqrz-kyth-cuet | An invalid downcast from nsTextNode to SVGElement could have lead to undefined behavior. |
CVE-2023-25737
|
VCID-gr4z-dpmd-h3c9 | On some systems—depending on the graphics settings and drivers—it was possible to force an out-of-bounds read and leak memory data into the images created on the canvas element. |
CVE-2023-6204
|
VCID-gveu-xsay-wfgr | If an AlignedBuffer were assigned to itself, the subsequent self-move could result in an incorrect reference count and later use-after-free. |
CVE-2024-3861
|
VCID-h9pe-16wc-wkdk | The black fade animation when exiting fullscreen is roughly the length of the anti-clickjacking delay on permission prompts. It was possible to use this fact to surprise users by luring them to click where the permission grant button would be about to appear. |
CVE-2023-6206
|
VCID-hk9b-q4rp-xbhz | An out-of-bounds read could have led to an exploitable crash when parsing HTML with DOMParser in low memory situations. |
CVE-2023-4048
|
VCID-htyn-11kz-g7ee | Mozilla developers Kershaw Chang and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 109 and Firefox ESR 102.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. |
CVE-2023-25744
|
VCID-huca-88sg-7yd9 | When storing and re-accessing data on a networking channel, the length of buffers may have been confused, resulting in an out-of-bounds memory read. |
CVE-2024-1546
|
VCID-j3a2-27sa-4ycu | When a ServiceWorker intercepted a request with FetchEvent, the origin of the request was lost after the ServiceWorker took ownership of it. This had the effect of negating SameSite cookie protections. This was addressed in the spec and then in browsers. |
CVE-2022-45410
|
VCID-j3cq-4fhd-pkfz | Using a markup injection an attacker could have stolen nonce values. This could have been used to bypass strict content security policies. |
CVE-2024-2610
|
VCID-j4y5-e47d-5be4 | A compromised content process could have provided malicious data in a PathRecording resulting in an out-of-bounds write, leading to a potentially exploitable crash in a privileged process. |
CVE-2023-5169
|
VCID-jcwt-hq1r-ukae | By confusing the browser, the fullscreen notification could have been delayed or suppressed, resulting in potential user confusion or spoofing attacks. |
CVE-2022-46877
|
VCID-jtzw-brs8-dycq | If a website called window.print() in a particular way, it could cause a denial of service of the browser, which may persist beyond browser restart depending on the user's session restore settings. |
CVE-2022-42929
|
VCID-k25r-8fhk-2ud7 | An attacker could have created a malicious link using bidirectional characters to spoof the location in the address bar when visited. |
CVE-2023-5732
|
VCID-k3aa-frya-zbdr | A type check was missing when handling fonts in PDF.js, which would allow arbitrary JavaScript execution in the PDF.js context. |
CVE-2024-4367
GHSA-wgrm-67xf-hhpq |
VCID-k4gg-dya5-jyf6 | Permission prompts for opening external schemes were only shown for ContentPrincipals resulting in extensions being able to open them without user interaction via ExpandedPrincipals. This could lead to further malicious actions such as downloading files or interacting with software already installed on the system. |
CVE-2023-25729
|
VCID-k4wu-xhbk-dbeq | If an out-of-memory condition occurred when creating a JavaScript global, a JavaScript realm may be deleted while references to it lived on in a BaseShape. This could lead to a use-after-free causing a potentially exploitable crash. |
CVE-2022-45406
|
VCID-k6yj-fr1k-d3e8 | A malicious website could have used a combination of exiting fullscreen mode and requestPointerLock to cause the user's mouse to be re-positioned unexpectedly, which could have led to user confusion and inadvertently granting permissions they did not intend to grant. |
CVE-2024-1550
|
VCID-kjyp-w578-6fht | Memory safety bugs present in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. |
CVE-2024-4777
|
VCID-krbp-cb9h-w3e3 | ANGLE failed to initialize parameters which led to reading from uninitialized memory. This could be leveraged to leak sensitive data from memory. |
CVE-2024-7526
|
VCID-m24s-v9kz-4qeh | Mozilla developers Timothy Nikkel, Andrew McCreight, and the Mozilla Fuzzing Team reported memory safety bugs present in Thunderbird 102.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. |
CVE-2023-28176
|
VCID-m6cs-xb54-f7fx | By tricking the browser with a X-Frame-Options header, a sandboxed iframe could have presented a button that, if clicked by a user, would bypass restrictions to open a new window. |
CVE-2024-5691
|
VCID-mmxj-ak9h-yfg4 | Cross-compartment wrappers wrapping a scripted proxy could have caused objects from other compartments to be stored in the main compartment resulting in a use-after-free. |
CVE-2023-37202
|
VCID-ms2d-9rb6-bbdb | A bug in popup notifications' interaction with WebAuthn made it easier for an attacker to trick a user into granting permissions. |
CVE-2024-4768
|
VCID-mt35-mc4f-pfh1 | When accessing throttled streams, the count of available bytes needed to be checked in the calling function to be within bounds. This may have lead future code to be incorrect and vulnerable. |
CVE-2023-25752
|
VCID-mv7v-5r9s-z7ef | Relative URLs starting with three slashes were incorrectly parsed, and a path-traversal "/../" part in the path could be used to override the specified host. This could contribute to security problems in web sites. |
CVE-2023-6209
|
VCID-naxk-hau5-vbg3 | Memory safety bugs present in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. |
CVE-2024-1553
|
VCID-ndv4-2838-hyas | An attacker could have triggered a use-after-free condition when creating a WebRTC connection over HTTPS. |
CVE-2023-37201
|
VCID-ngx5-z32y-wyej | To harden ICU against exploitation, the behavior for out-of-memory conditions was changed to crash instead of attempt to continue. |
CVE-2024-2616
|
VCID-nhdq-ywpg-xfep | When encoding data from an inputStream in xpcom the size of the input being encoded was not correctly calculated potentially leading to an out of bounds memory write. |
CVE-2023-25732
|
VCID-nr5n-zkwn-gqdb | A double-free in libwebp could have led to memory corruption and a potentially exploitable crash. |
CVE-2023-1999
|
VCID-nrhs-6g3h-jkce | If a custom mouse cursor is specified in CSS, under certain circumstances the cursor could have been drawn over the browser UI, resulting in potential user confusion or spoofing attacks. |
CVE-2022-45418
|
VCID-nxqw-uetc-cqer | Service Workers should not be able to infer information about opaque cross-origin responses; but timing information for cross-origin media combined with Range requests might have allowed them to determine the presence or length of a media file. |
CVE-2022-45403
|
VCID-ny7s-ukmh-43dp | Return registers were overwritten which could have allowed an attacker to execute arbitrary code. *Note:* This issue only affected Armv7-A systems. Other operating systems are unaffected. |
CVE-2024-2607
|
VCID-p6n8-byvk-gqhh | If an attacker could find a way to trigger a particular code path in SafeRefPtr, it could have triggered a crash or potentially be leveraged to achieve code execution. |
CVE-2024-2612
|
VCID-pe8x-79nr-3qg4 | Opening a malicious WebP image could lead to a heap buffer overflow in the content process. We are aware of this issue being exploited in other products in the wild. *Note: This advisory was previously also tracked as CVE-2023-5129.* |
CVE-2023-4863
GHSA-j7hp-h8jx-5ppr |
VCID-ph9t-2t9j-ebee | A Linux user opening the print preview dialog could have caused the browser to crash. |
CVE-2024-0746
|
VCID-pmka-qzkv-qfaz | A same-origin policy violation could have allowed the theft of cross-origin URL entries, leaking the result of a redirect, via performance.getEntries(). |
CVE-2022-42927
|
VCID-pmw9-e1rd-bkek | Dragging a URL from a cross-origin iframe that was removed during the drag could have led to user confusion and website spoofing attacks. |
CVE-2023-28164
|
VCID-pygn-jmwv-7kfz | The date picker could partially obscure security prompts. This could be used by a malicious site to trick a user into granting permissions. |
CVE-2024-7529
|
VCID-q21e-w1gc-skdv | In some circumstances, a stale value could have been used for a global variable in WASM JIT analysis. This resulted in incorrect compilation and a potentially exploitable crash in the content process. |
CVE-2023-4046
|
VCID-qbxz-6fha-ffcj | Mozilla developers Andrew McCreight and Gabriele Svelto reported memory safety bugs present in Thunderbird 102.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. |
CVE-2022-45421
|
VCID-qebz-sz1v-h7h9 | Memory safety bugs present in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. |
CVE-2024-5700
|
VCID-qphu-a5ck-a7dw | If a website set a large custom cursor, portions of the cursor could have overlapped with the permission dialog, potentially resulting in user confusion and unexpected granted permissions. |
CVE-2024-1549
|
VCID-qq4y-61vn-pfdq | Specific handling of an attacker-controlled VP8 media stream could lead to a heap buffer overflow in the content process. We are aware of this issue being exploited in other products in the wild. |
CVE-2023-5217
GHSA-qqvq-6xgj-jw8g |
VCID-qrup-ehn7-dfgc | Mozilla developers and community members Gabriele Svelto, Andrew Osmond, Emily McDonough, Sebastian Hengst, Andrew McCreight and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 112 and Firefox ESR 102.10. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. |
CVE-2023-32215
|
VCID-r966-9pka-ckg6 | During garbage collection extra operations were performed on a object that should not be. This could have led to a potentially exploitable crash. |
CVE-2023-5728
|
VCID-rbp2-94me-aygw | An out-of-bound read could have led to a crash in the RLBox Expat driver. |
CVE-2023-32206
|
VCID-rgx1-1g16-5kfz | Firefox was susceptible to a heap buffer overflow in nsTextFragment due to insufficient OOM handling. |
CVE-2023-6858
|
VCID-rhnk-af69-4yeg | Offscreen Canvas did not properly track cross-origin tainting, which could have been used to access image data from another site in violation of same-origin policy. |
CVE-2023-4045
|
VCID-rqk9-x8mr-qke1 | Cross-compartment wrappers wrapping a scripted proxy could have caused objects from other compartments to be stored in the main compartment resulting in a use-after-free after unwrapping the proxy. |
CVE-2023-25735
|
VCID-ruhc-cf5n-hbd3 | When reading a file, an uninitialized value could have been used as read limit. |
CVE-2023-32213
|
VCID-ruvk-r8k8-cbga | Mozilla developers Ashley Hale and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 105 and Firefox ESR 102.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. |
CVE-2022-42932
|
VCID-s1fz-rc4p-zfhy | If a garbage collection was triggered at the right time, a use-after-free could have occurred during object transplant. |
CVE-2024-5688
|
VCID-s6eg-cpph-bkgz | Through a series of API calls and redirects, an attacker-controlled alert dialog could have been displayed on another website (with the victim website's URL shown). |
CVE-2024-1547
|
VCID-s7qh-rv74-mqfx | NSS was susceptible to a timing side-channel attack when performing RSA decryption. This attack could potentially allow an attacker to recover the private data. |
CVE-2023-5388
|
VCID-sbwe-dz4e-xbb8 | In some cases, an untrusted input stream was copied to a stack buffer without checking its size. This resulted in a potentially exploitable crash which could have led to a sandbox escape. |
CVE-2023-4050
|
VCID-sfms-zkfg-qucd | It was possible for certain browser prompts and dialogs to be activated or dismissed unintentionally by the user due to an incorrect timestamp used to prevent input after page load. |
CVE-2024-0742
|
VCID-sh21-7z9q-9fhf | When importing a SPKI RSA public key as ECDSA P-256, the key would be handled incorrectly causing the tab to crash. |
CVE-2023-25742
|
VCID-ssmm-me5s-pyd7 | While implementing AudioWorklets, some code may have casted one type to another, invalid, dynamic type. This could have led to a potentially exploitable crash. |
CVE-2023-28162
|
VCID-svsu-9tu4-cuab | A file with a long filename could have had its filename truncated to remove the valid extension, leaving a malicious extension in its place. This could potentially led to user confusion and the execution of malicious code. |
CVE-2022-46874
|
VCID-tsef-58my-b3bx | An attacker could cause the memory manager to incorrectly free a pointer that addresses attacker-controlled memory, resulting in an assertion, memory corruption, or a potentially exploitable crash. |
CVE-2023-29536
|
VCID-twbq-jsyg-qkf6 | The timing of a button click causing a popup to disappear was approximately the same length as the anti-clickjacking delay on permission prompts. It was possible to use this fact to surprise users by luring them to click where the permission grant button would be about to appear. |
CVE-2023-6867
|
VCID-u3kz-wawz-wue5 | Through a series of popup and window.print() calls, an attacker can cause a window to go fullscreen without the user seeing the notification prompt, resulting in potential user confusion or spoofing attacks. |
CVE-2022-45404
|
VCID-u5en-jug6-y3hh | A type checking bug would have led to invalid code being compiled. |
CVE-2023-32211
|
VCID-up4y-76c8-rkh9 | Use tables inside of an iframe, an attacker could have caused iframe contents to be rendered outside the boundaries of the iframe, resulting in potential user confusion or spoofing attacks. |
CVE-2022-45420
|
VCID-uyjv-pzzh-rqcf | An out of bounds write in ANGLE could have allowed an attacker to corrupt memory leading to a potentially exploitable crash. |
CVE-2024-0741
|
VCID-uyud-fux1-9fb1 | When creating a callback over IPC for showing the File Picker window, multiple of the same callbacks could have been created at a time and eventually all simultaneously destroyed as soon as one of the callbacks finished. This could have led to a use-after-free causing a potentially exploitable crash. |
CVE-2023-4575
|
VCID-v3dz-8kdr-r7dx | Firefox adds web-compatibility shims in place of some tracking scripts blocked by Enhanced Tracking Protection. On a site protected by Content Security Policy in "strict-dynamic" mode, an attacker able to inject an HTML element could have used a DOM Clobbering attack on some of the shims and achieved XSS, bypassing the CSP strict-dynamic protection. |
CVE-2024-7524
|
VCID-v5cm-62ps-2be8 | A use-after-free condition affected TLS socket creation when under memory pressure. |
CVE-2023-6859
|
VCID-v6cu-c3v8-qkgg | A use-after-free in WebGL extensions could have led to a potentially exploitable crash. |
CVE-2022-46882
|
VCID-v7qg-mqs6-g3e8 | A phishing site could have repurposed an about: dialog to show phishing content with an incorrect origin in the address bar. |
CVE-2024-0749
|
VCID-v94p-ycty-yug5 | Memory safety bugs present in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. |
CVE-2023-6864
|
VCID-veyd-23sa-dug8 | Following a Garbage Collector compaction, weak maps may have been accessed before they were correctly traced. This resulted in memory corruption and a potentially exploitable crash. |
CVE-2023-29535
|
VCID-vg49-ebuq-uuc5 | By monitoring the time certain operations take, an attacker could have guessed which external protocol handlers were functional on a user's system. |
CVE-2024-5690
|
VCID-vqau-1p4x-myby | When receiving rendering data over IPC mStream could have been destroyed when initialized, which could have led to a use-after-free causing a potentially exploitable crash. |
CVE-2023-4573
|
VCID-vr9v-p35b-67fx | A mishandled security check when creating a WebSocket in a WebWorker caused the Content Security Policy connect-src header to be ignored. This could lead to connections to restricted origins from inside WebWorkers. |
CVE-2023-23602
|
VCID-w8ff-m944-13fy | Mozilla developers Randell Jesup, Valentin Gosu, Olli Pettay, and the Mozilla Fuzzing Team reported memory safety bugs present in Thunderbird 102.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. |
CVE-2022-46878
|
VCID-wgxf-9djm-cbbf | The JIT created incorrect code for arguments in certain cases. This led to potential use-after-free crashes during garbage collection. |
CVE-2024-3857
|
VCID-wsv7-rvqw-9ud3 | An out-of-bounds read can occur when decoding H264 video. This results in a potentially exploitable crash. |
CVE-2022-3266
|
VCID-wzd8-v9v4-4uhv | Due to the Firefox GTK wrapper code's use of text/plain for drag data and GTK treating all text/plain MIMEs containing file URLs as being dragged a website could arbitrarily read a file via a call to DataTransfer.setData. |
CVE-2023-23598
|
VCID-wzpq-hcn5-8uh3 | The VideoBridge allowed any content process to use textures produced by remote decoders. This could be abused to escape the sandbox. |
CVE-2023-6860
|
VCID-x13h-86vt-97hp | The nsWindow::PickerOpen(void) method was susceptible to a heap buffer overflow when running in headless mode. |
CVE-2023-6861
|
VCID-x4se-7tqq-eqca | A malicious installed WebExtension could open arbitrary URLs, which under the right circumstance could be leveraged to collect sensitive user data. |
CVE-2023-5725
|
VCID-x5pe-8vhg-zfh3 | Insufficient checks when processing graphics shared memory could have led to memory corruption. This could be leveraged by an attacker to perform a sandbox escape. |
CVE-2024-7519
|
VCID-xehq-m4s8-1yhj | An attacker was able to inject an event handler into a privileged object that would allow arbitrary JavaScript execution in the parent process. Note: This vulnerability affects Desktop Firefox only, it does not affect mobile versions of Firefox. |
CVE-2024-29944
|
VCID-xfye-u98n-sfgw | When resolving a symlink, a race may occur where the buffer passed to readlink may actually be smaller than necessary. *This bug only affects Firefox on Unix-based operating systems (Android, Linux, MacOS). Windows is unaffected.* |
CVE-2023-6857
|
VCID-xz3k-bf3j-e7gr | When opening Diagcab files, Firefox did not warn the user that these files may contain malicious code. |
CVE-2023-37208
|
VCID-yqjn-5kut-6qbk | An attacker could construct a PKCS 12 cert bundle in such a way that could allow for arbitrary memory writes via PKCS 12 Safe Bag attributes being mishandled. |
CVE-2023-0767
|
VCID-yt9p-uf9q-sbgd | An optimization in WebGL was incorrect in some cases, and could have led to memory corruption and a potentially exploitable crash. |
CVE-2022-46881
|
VCID-yvkd-ez4z-muc4 | AppendEncodedAttributeValue(), ExtraSpaceNeededForAttrEncoding() and AppendEncodedCharacters() could have experienced integer overflows, causing underallocation of an output buffer leading to an out of bounds write. |
CVE-2024-2608
|
VCID-z1n4-zmdy-77ck | Mozilla developers Randell Jesup, Andrew Osmond, Sebastian Hengst, Andrew McCreight, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 111 and Firefox ESR 102.9. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. |
CVE-2023-29550
|
VCID-z2pe-sj64-myag | An attacker who compromised a content process could have partially escaped the sandbox to read arbitrary files via clipboard-related IPC messages.*This bug only affects Thunderbird for Linux. Other operating systems are unaffected.* |
CVE-2022-46872
|
VCID-z36a-mzpf-gyg7 | When injecting an HTML base element, some requests would ignore the CSP's base-uri settings and accept the injected element's base instead. |
CVE-2022-40956
|
VCID-zbyj-zuwa-e7hn | Calling PK11_Encrypt() in NSS using CKM_CHACHA20 and the same buffer for input and output can result in plaintext on an Intel Sandy Bridge processor. In Firefox this only affects the QUIC header protection feature when the connection is using the ChaCha20-Poly1305 cipher suite. The most likely outcome is connection failure, but if the connection persists despite the high packet loss it could be possible for a network observer to identify packets as coming from the same source despite a network path change. |
CVE-2024-7531
|
VCID-zt7u-h5n8-cfa8 | Race conditions in reference counting code were found through code inspection. These could have resulted in potentially exploitable use-after-free vulnerabilities. |
CVE-2023-4049
|
VCID-zts4-2wwx-z3d5 | Memory safety bug present in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9. This bug showed evidence of memory corruption and we presume that with enough effort this could have been exploited to run arbitrary code. |
CVE-2024-3864
|
VCID-zxhy-6uab-3ycb | Regular expressions used to filter out forbidden properties and values from style directives in calls to console.log weren't accounting for external URLs. Data could then be potentially exfiltrated from the browser. |
CVE-2023-23603
|
VCID-zzut-q5b2-skb6 | Set-Cookie response headers were being incorrectly honored in multipart HTTP responses. If an attacker could control the Content-Type response header, as well as control part of the response body, they could inject Set-Cookie response headers that would have been honored by the browser. |
CVE-2024-1551
|