Latest mozilla firefox Vulnerabilities

When browsing private tabs, some data related to location history or webpage thumbnails could be persisted incorrectly within the sandboxed app bundle after app termination
Mozilla Firefox=127
Apple iOS
Security Vulnerabilities fixed in Firefox for iOS 127
Mozilla Firefox=127
Apple iOS
In certain scenarios a malicious website could attempt to display a fake location URL bar which could mislead users as to the actual website address
Mozilla Firefox=127
Apple iOS
By manipulating the fullscreen feature while opening a data-list, an attacker could have overlaid a text box over the address bar. This could have led to user confusion and possible spoofing attacks.
Mozilla Firefox<127
If a specific sequence of actions is performed when opening a new tab, the triggering principal associated with the new tab may have been incorrect. The triggering principal is used to calculate many ...
Mozilla Firefox<127
Memory safety bugs present in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these coul...
Mozilla Firefox<127
redhat/firefox<115.12
Mozilla Firefox ESR<115.12
ubuntu/thunderbird<1:115.12.0+
ubuntu/thunderbird<1:115.12.0+
ubuntu/thunderbird<1:115.12.0+
and 4 more
In violation of spec, cookie prefixes such as __Secure were being ignored if they were not correctly capitalized - by spec they should be checked with a case-insensitive comparison. This could have re...
Mozilla Firefox<127
An attacker could have caused a use-after-free in the JavaScript engine to read memory in the JavaScript string section of the heap.
Mozilla Firefox<127
By manipulating the text in an `&lt;input&gt;` tag, an attacker could have caused corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 127 and Firefox ESR < ...
Mozilla Firefox<127
redhat/firefox<115.12
Mozilla Firefox ESR<115.12
ubuntu/thunderbird<1:115.12.0+
ubuntu/thunderbird<1:115.12.0+
ubuntu/thunderbird<1:115.12.0+
and 4 more
Security Vulnerabilities fixed in Firefox 127
Mozilla Firefox<127
If an out-of-memory condition occurs at a specific point using allocations in the probabilistic heap checker, an assertion could have been triggered, and in rarer situations, memory corruption could h...
Mozilla Firefox<127
If a garbage collection was triggered at the right time, a use-after-free could have occurred during object transplant. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12.
Mozilla Firefox<127
redhat/firefox<115.12
Mozilla Firefox ESR<115.12
ubuntu/thunderbird<1:115.12.0+
ubuntu/thunderbird<1:115.12.0+
ubuntu/thunderbird<1:115.12.0+
and 4 more
By monitoring the time certain operations take, an attacker could have guessed which external protocol handlers were functional on a user's system. This vulnerability affects Firefox < 127 and Firefox...
Mozilla Firefox<127
redhat/firefox<115.12
Mozilla Firefox ESR<115.12
ubuntu/thunderbird<1:115.12.0+
ubuntu/thunderbird<1:115.12.0+
ubuntu/thunderbird<1:115.12.0+
and 4 more
On Windows 10, when using the 'Save As' functionality, an attacker could have tricked the browser into saving the file with a disallowed extension such as .url by including an invalid character in the...
Mozilla Firefox<127
Mozilla Firefox ESR<115.12
Mozilla Thunderbird<115.12
Memory safety bugs present in Firefox 126. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
Mozilla Firefox<127
A website was able to detect when a user took a screenshot of a page using the built-in Screenshot functionality in Firefox.
Mozilla Firefox<127
In addition to detecting when a user was taking a screenshot (XXX), a website was able to overlay the 'My Shots' button that appeared, and direct the user to a replica Firefox Screenshots page that co...
Mozilla Firefox<127
By tricking the browser with a `X-Frame-Options` header, a sandboxed iframe could have presented a button that, if clicked by a user, would bypass restrictions to open a new window. This vulnerability...
Mozilla Firefox<127
redhat/firefox<115.12
Mozilla Firefox ESR<115.12
ubuntu/thunderbird<1:115.12.0+
ubuntu/thunderbird<1:115.12.0+
ubuntu/thunderbird<1:115.12.0+
and 4 more
Offscreen Canvas did not properly track cross-origin tainting, which could be used to access image data from another site in violation of same-origin policy. This vulnerability affects Firefox < 127 a...
Mozilla Firefox<127
redhat/firefox<115.12
Mozilla Firefox ESR<115.12
ubuntu/thunderbird<1:115.12.0+
ubuntu/thunderbird<1:115.12.0+
ubuntu/thunderbird<1:115.12.0+
and 4 more
Different techniques existed to obscure the fullscreen notification in Firefox for Android. These could have lead to potential user confusion and spoofing attacks. *This bug only affects Firefox for ...
Mozilla Firefox<126
When saving a page to PDF, certain font styles could have led to a potential use-after-free crash. This vulnerability affects Firefox < 126, Firefox ESR < 115.11, and Thunderbird < 115.11.
Mozilla Firefox ESR<115.11
Mozilla Thunderbird<115.11
ubuntu/firefox<126.0+
ubuntu/thunderbird<1:115.11.0+
ubuntu/thunderbird<1:115.11.0+
ubuntu/thunderbird<1:115.11.0+
and 6 more
A file dialog shown while in full-screen mode could have resulted in the window remaining disabled. This vulnerability affects Firefox < 126.
ubuntu/firefox<126.0+
Mozilla Firefox<126
debian/firefox
Multiple WebRTC threads could have claimed a newly connected audio input leading to use-after-free. This vulnerability affects Firefox < 126.
ubuntu/firefox<126.0+
Mozilla Firefox<126
debian/firefox
A memory allocation check was missing which would lead to a use-after-free if the allocation failed. This could have triggered a crash or potentially be leveraged to achieve code execution. This vulne...
ubuntu/firefox<126.0+
Mozilla Firefox<126
debian/firefox
Security Vulnerabilities fixed in Firefox 126
Mozilla Firefox<126
An iterator stop condition was missing when handling WASM code in the built-in profiler, potentially leading to invalid memory access and undefined behavior. *Note:* This issue only affects the applic...
ubuntu/firefox<126.0+
Mozilla Firefox<126
debian/firefox
When importing resources using Web Workers, error messages would distinguish the difference between `application/javascript` responses and non-script responses. This could have been abused to learn in...
Mozilla Firefox ESR<115.11
Mozilla Thunderbird<115.11
Mozilla Firefox<126
ubuntu/firefox<126.0+
ubuntu/thunderbird<1:115.11.0+
ubuntu/thunderbird<1:115.11.0+
and 6 more
An HTTP digest authentication nonce value was generated using `rand()` which could lead to predictable values. This vulnerability affects Firefox < 126.
ubuntu/firefox<126.0+
Mozilla Firefox<126
debian/firefox
The `ShmemCharMapHashEntry()` code was susceptible to potentially undefined behavior by bypassing the move semantics for one of its data members. This vulnerability affects Firefox < 126.
ubuntu/firefox<126.0+
Mozilla Firefox<126
debian/firefox
When a network error occurred during page load, the prior content could have remained in view with a blank URL bar. This could have been used to obfuscate a spoofed web site. This vulnerability affect...
ubuntu/firefox<126.0+
Mozilla Firefox<126
debian/firefox
A bug in popup notifications' interaction with WebAuthn made it easier for an attacker to trick a user into granting permissions. This vulnerability affects Firefox < 126, Firefox ESR < 115.11, and Th...
Mozilla Firefox ESR<115.11
Mozilla Thunderbird<115.11
ubuntu/firefox<126.0+
ubuntu/thunderbird<1:115.11.0+
ubuntu/thunderbird<1:115.11.0+
ubuntu/thunderbird<1:115.11.0+
and 6 more
If the `browser.privatebrowsing.autostart` preference is enabled, IndexedDB files were not properly deleted when the window was closed. This preference is disabled by default in Firefox. This vulnerab...
Mozilla Firefox ESR<115.11
Mozilla Thunderbird<115.11
ubuntu/firefox<126.0+
ubuntu/thunderbird<1:115.11.0+
ubuntu/thunderbird<1:115.11.0+
ubuntu/thunderbird<1:115.11.0+
and 6 more
Web application manifests were stored by using an insecure MD5 hash which allowed for a hash collision to overwrite another application's manifest. This could have been exploited to run arbitrary code...
Mozilla Firefox<126
Memory safety bugs present in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these coul...
Mozilla Firefox ESR<115.11
Mozilla Thunderbird<115.11
ubuntu/firefox<126.0+
ubuntu/thunderbird<1:115.11.0+
ubuntu/thunderbird<1:115.11.0+
ubuntu/thunderbird<1:115.11.0+
and 6 more
Memory safety bugs present in Firefox 125. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code....
ubuntu/firefox<126.0+
Mozilla Firefox<126
debian/firefox
### Impact If pdf.js is used to load a malicious PDF, and PDF.js is configured with `isEvalSupported` set to `true` (which is the default value), unrestricted attacker-controlled JavaScript will be ex...
Mozilla Firefox ESR<115.11
npm/pdfjs-dist<=4.1.392
Mozilla Thunderbird<115.11
ubuntu/firefox<126.0+
ubuntu/thunderbird<1:115.11.0+
ubuntu/thunderbird<1:115.11.0+
and 8 more
Memory safety bug present in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9. This bug showed evidence of memory corruption and we presume that with enough effort this could have been exploited ...
redhat/firefox<115.10
redhat/thunderbird<115.10
Mozilla Firefox ESR<115.10
Mozilla Thunderbird<115.10
ubuntu/firefox<125.0.2+
ubuntu/thunderbird<1:115.10.1+
and 6 more
Memory safety bugs present in Firefox 124. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code....
ubuntu/firefox<125.0.2+
debian/firefox
Mozilla Firefox<125
Security Vulnerabilities fixed in Firefox 125
Mozilla Firefox<125
The executable file warning was not presented when downloading .xrm-ms files. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.* This vulnerability a...
<115.10
<115.10
Mozilla Firefox<125
It was possible to mutate a JavaScript object so that the JIT could crash while tracing it. This vulnerability affects Firefox < 125.
ubuntu/firefox<125.0.2+
debian/firefox
Mozilla Firefox<125
The MarkStack assignment operator, part of the JavaScript engine, could access uninitialized memory if it were used in a self-assignment. This vulnerability affects Firefox < 125.
ubuntu/firefox<125.0.2+
debian/firefox
Mozilla Firefox<125
An out-of-memory condition during object initialization could result in an empty shape list. If the JIT subsequently traced the object it would crash. This vulnerability affects Firefox < 125.
ubuntu/firefox<125.0.2+
debian/firefox
Mozilla Firefox<125
The JIT created incorrect code for arguments in certain cases. This led to potential use-after-free crashes during garbage collection. This vulnerability affects Firefox < 125, Firefox ESR < 115.10, a...
redhat/firefox<115.10
redhat/thunderbird<115.10
Mozilla Firefox ESR<115.10
Mozilla Thunderbird<115.10
ubuntu/firefox<125.0.2+
ubuntu/thunderbird<1:115.10.1+
and 6 more
A use-after-free could occur during WASM execution if garbage collection ran during the creation of an array. This vulnerability affects Firefox < 125.
ubuntu/firefox<125.0.2+
debian/firefox
Mozilla Firefox<125
A use-after-free could result if a JavaScript realm was in the process of being initialized when a garbage collection started. This vulnerability affects Firefox < 125.
ubuntu/firefox<125.0.2+
debian/firefox
Mozilla Firefox<125
If an AlignedBuffer were assigned to itself, the subsequent self-move could result in an incorrect reference count and later use-after-free. This vulnerability affects Firefox < 125, Firefox ESR < 115...
redhat/firefox<115.10
redhat/thunderbird<115.10
Mozilla Firefox ESR<115.10
Mozilla Thunderbird<115.10
ubuntu/firefox<125.0.2+
ubuntu/thunderbird<1:115.10.1+
and 6 more
On 32-bit versions there were integer-overflows that led to an out-of-bounds-read that potentially could be triggered by a malformed OpenType font. This vulnerability affects Firefox < 125, Firefox ES...
redhat/firefox<115.10
redhat/thunderbird<115.10
Mozilla Firefox ESR<115.10
Mozilla Thunderbird<115.10
ubuntu/firefox<125.0.2+
ubuntu/thunderbird<1:115.10.1+
and 6 more
In some code patterns the JIT incorrectly optimized switch statements and generated code with out-of-bounds-reads. This vulnerability affects Firefox < 125, Firefox ESR < 115.10, and Thunderbird < 115...
redhat/firefox<115.10
redhat/thunderbird<115.10
Mozilla Firefox ESR<115.10
Mozilla Thunderbird<115.10
ubuntu/firefox<125.0.2+
ubuntu/thunderbird<1:115.10.1+
and 6 more
In certain cases the JIT incorrectly optimized MSubstr operations, which led to out-of-bounds reads. This vulnerability affects Firefox < 125.
ubuntu/firefox<125.0.2+
debian/firefox
Mozilla Firefox<125

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203