Latest mozilla firefox esr Vulnerabilities

A mismatch between allocator and deallocator could have lead to memory corruption. This vulnerability affects Firefox < 128, Firefox ESR < 115.13, Thunderbird < 115.13, and Thunderbird < 128.
Mozilla Thunderbird<128
Mozilla Firefox ESR<115.13
Mozilla Firefox<128
Mozilla Thunderbird<115.13
redhat/firefox<115.13
redhat/thunderbird<115.13
and 6 more
Memory safety bugs present in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these coul...
Mozilla Thunderbird<128
Mozilla Firefox<128
Mozilla Firefox ESR<115.13
Mozilla Thunderbird<115.13
redhat/firefox<115.13
redhat/thunderbird<115.13
and 6 more
Due to large allocation checks in Angle for GLSL shaders being too lenient an out-of-bounds access could occur when allocating more than 8192 ints in private shader memory on mac OS. This vulnerabilit...
Mozilla Thunderbird<128
Mozilla Firefox ESR<115.13
Mozilla Firefox<128
Mozilla Thunderbird<115.13
debian/firefox
debian/firefox-esr
and 1 more
In an out-of-memory scenario an allocation could fail but free would have been called on the pointer afterwards leading to memory corruption. This vulnerability affects Firefox < 128, Firefox ESR < 11...
Mozilla Thunderbird<128
Mozilla Firefox<128
Mozilla Firefox ESR<115.13
Mozilla Thunderbird<115.13
redhat/firefox<115.13
redhat/thunderbird<115.13
and 6 more
Security Vulnerabilities fixed in Firefox ESR 115.13
Mozilla Firefox ESR<115.13
A race condition could lead to a cross-origin container obtaining permissions of the top-level origin. This vulnerability affects Firefox < 128, Firefox ESR < 115.13, Thunderbird < 115.13, and Thunder...
Mozilla Thunderbird<128
Mozilla Firefox ESR<115.13
Mozilla Firefox<128
Mozilla Thunderbird<115.13
redhat/firefox<115.13
redhat/thunderbird<115.13
and 6 more
Memory safety bugs present in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these coul...
Mozilla Firefox ESR<115.12
Mozilla Thunderbird<115.12
redhat/firefox<115.12
redhat/thunderbird<115.12
Mozilla Firefox<127
ubuntu/firefox<127.0.2+
and 7 more
By manipulating the text in an `&lt;input&gt;` tag, an attacker could have caused corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 127, Firefox ESR < 115...
Mozilla Firefox ESR<115.12
Mozilla Thunderbird<115.12
redhat/firefox<115.12
redhat/thunderbird<115.12
Mozilla Firefox<127
ubuntu/firefox<127.0.2+
and 7 more
On Windows 10, when using the 'Save As' functionality, an attacker could have tricked the browser into saving the file with a disallowed extension such as .url by including an invalid character in the...
Mozilla Firefox<127
Mozilla Firefox ESR<115.12
Mozilla Thunderbird<115.12
By monitoring the time certain operations take, an attacker could have guessed which external protocol handlers were functional on a user's system. This vulnerability affects Firefox < 127, Firefox ES...
Mozilla Firefox ESR<115.12
Mozilla Thunderbird<115.12
redhat/firefox<115.12
redhat/thunderbird<115.12
Mozilla Firefox<127
ubuntu/firefox<127.0.2+
and 7 more
If a garbage collection was triggered at the right time, a use-after-free could have occurred during object transplant. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird ...
Mozilla Firefox ESR<115.12
Mozilla Thunderbird<115.12
redhat/firefox<115.12
redhat/thunderbird<115.12
Mozilla Firefox<127
ubuntu/firefox<127.0.2+
and 7 more
Security Vulnerabilities fixed in Firefox ESR 115.12
Mozilla Firefox ESR<115.12
By tricking the browser with a `X-Frame-Options` header, a sandboxed iframe could have presented a button that, if clicked by a user, would bypass restrictions to open a new window. This vulnerability...
Mozilla Firefox ESR<115.12
Mozilla Thunderbird<115.12
redhat/firefox<115.12
redhat/thunderbird<115.12
Mozilla Firefox<127
ubuntu/firefox<127.0.2+
and 7 more
Offscreen Canvas did not properly track cross-origin tainting, which could be used to access image data from another site in violation of same-origin policy. This vulnerability affects Firefox < 127, ...
Mozilla Firefox ESR<115.12
Mozilla Thunderbird<115.12
redhat/firefox<115.12
redhat/thunderbird<115.12
Mozilla Firefox<127
ubuntu/firefox<127.0.2+
and 7 more
If the `browser.privatebrowsing.autostart` preference is enabled, IndexedDB files were not properly deleted when the window was closed. This preference is disabled by default in Firefox. This vulnerab...
Mozilla Firefox ESR<115.11
Mozilla Thunderbird<115.11
ubuntu/firefox<126.0+
ubuntu/thunderbird<1:115.11.0+
ubuntu/thunderbird<1:115.11.0+
ubuntu/thunderbird<1:115.11.0+
and 6 more
A bug in popup notifications' interaction with WebAuthn made it easier for an attacker to trick a user into granting permissions. This vulnerability affects Firefox < 126, Firefox ESR < 115.11, and Th...
Mozilla Firefox ESR<115.11
Mozilla Thunderbird<115.11
ubuntu/firefox<126.0+
ubuntu/thunderbird<1:115.11.0+
ubuntu/thunderbird<1:115.11.0+
ubuntu/thunderbird<1:115.11.0+
and 6 more
When saving a page to PDF, certain font styles could have led to a potential use-after-free crash. This vulnerability affects Firefox < 126, Firefox ESR < 115.11, and Thunderbird < 115.11.
Mozilla Firefox ESR<115.11
Mozilla Thunderbird<115.11
ubuntu/firefox<126.0+
ubuntu/thunderbird<1:115.11.0+
ubuntu/thunderbird<1:115.11.0+
ubuntu/thunderbird<1:115.11.0+
and 6 more
Security Vulnerabilities fixed in Firefox ESR 115.11
Mozilla Firefox ESR<115.11
When importing resources using Web Workers, error messages would distinguish the difference between `application/javascript` responses and non-script responses. This could have been abused to learn in...
Mozilla Firefox ESR<115.11
Mozilla Thunderbird<115.11
Mozilla Firefox<126
ubuntu/firefox<126.0+
ubuntu/thunderbird<1:115.11.0+
ubuntu/thunderbird<1:115.11.0+
and 6 more
Memory safety bugs present in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these coul...
Mozilla Firefox ESR<115.11
Mozilla Thunderbird<115.11
ubuntu/firefox<126.0+
ubuntu/thunderbird<1:115.11.0+
ubuntu/thunderbird<1:115.11.0+
ubuntu/thunderbird<1:115.11.0+
and 6 more
### Impact If pdf.js is used to load a malicious PDF, and PDF.js is configured with `isEvalSupported` set to `true` (which is the default value), unrestricted attacker-controlled JavaScript will be ex...
Mozilla Firefox ESR<115.11
Mozilla Thunderbird<115.11
ubuntu/firefox<126.0+
ubuntu/thunderbird<1:115.11.0+
ubuntu/thunderbird<1:115.11.0+
ubuntu/thunderbird<1:115.11.0+
and 9 more
On 32-bit versions there were integer-overflows that led to an out-of-bounds-read that potentially could be triggered by a malformed OpenType font. This vulnerability affects Firefox < 125, Firefox ES...
redhat/firefox<115.10
redhat/thunderbird<115.10
Mozilla Firefox ESR<115.10
Mozilla Thunderbird<115.10
ubuntu/firefox<125.0.2+
ubuntu/thunderbird<1:115.10.1+
and 6 more
In some code patterns the JIT incorrectly optimized switch statements and generated code with out-of-bounds-reads. This vulnerability affects Firefox < 125, Firefox ESR < 115.10, and Thunderbird < 115...
redhat/firefox<115.10
redhat/thunderbird<115.10
Mozilla Firefox ESR<115.10
Mozilla Thunderbird<115.10
ubuntu/firefox<125.0.2+
ubuntu/thunderbird<1:115.10.1+
and 6 more
If an AlignedBuffer were assigned to itself, the subsequent self-move could result in an incorrect reference count and later use-after-free. This vulnerability affects Firefox < 125, Firefox ESR < 115...
redhat/firefox<115.10
redhat/thunderbird<115.10
Mozilla Firefox ESR<115.10
Mozilla Thunderbird<115.10
ubuntu/firefox<125.0.2+
ubuntu/thunderbird<1:115.10.1+
and 6 more
The executable file warning was not presented when downloading .xrm-ms files. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.* This vulnerability a...
<115.10
<115.10
Mozilla Firefox<125
The JIT created incorrect code for arguments in certain cases. This led to potential use-after-free crashes during garbage collection. This vulnerability affects Firefox < 125, Firefox ESR < 115.10, a...
redhat/firefox<115.10
redhat/thunderbird<115.10
Mozilla Firefox ESR<115.10
Mozilla Thunderbird<115.10
ubuntu/firefox<125.0.2+
ubuntu/thunderbird<1:115.10.1+
and 6 more
Memory safety bug present in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9. This bug showed evidence of memory corruption and we presume that with enough effort this could have been exploited ...
redhat/firefox<115.10
redhat/thunderbird<115.10
Mozilla Firefox ESR<115.10
Mozilla Thunderbird<115.10
ubuntu/firefox<125.0.2+
ubuntu/thunderbird<1:115.10.1+
and 6 more
Security Vulnerabilities fixed in Firefox ESR 115.10
Mozilla Firefox ESR<115.10
GetBoundName could return the wrong version of an object when JIT optimizations were applied. This vulnerability affects Firefox < 125, Firefox ESR < 115.10, and Thunderbird < 115.10.
redhat/firefox<115.10
redhat/thunderbird<115.10
Mozilla Firefox ESR<115.10
Mozilla Thunderbird<115.10
ubuntu/firefox<125.0.2+
ubuntu/thunderbird<1:115.10.1+
and 6 more
Memory corruption in the networking stack could have led to a potentially exploitable crash. This vulnerability affects Firefox < 125, Firefox ESR < 115.12, and Thunderbird < 115.12.
Mozilla Firefox<125
Mozilla Firefox ESR<115.12
Mozilla Thunderbird<115.12
redhat/firefox<115.12
redhat/thunderbird<115.12
ubuntu/firefox<125.0.2+
and 7 more
Per initial information provided via VINCE: Mozilla has reserved <a href="https://access.redhat.com/security/cve/CVE-2024-3302">CVE-2024-3302</a> for this issue in the Gecko networking implementation...
Mozilla Firefox ESR<115.10
Mozilla Thunderbird<115.10
redhat/firefox<115.10
redhat/thunderbird<115.10
ubuntu/firefox<125.0.2+
ubuntu/thunderbird<1:115.10.1+
and 6 more
Security Vulnerabilities fixed in Firefox ESR 115.9.1
Mozilla Firefox ESR<115.9.1
An attacker was able to inject an event handler into a privileged object that would allow arbitrary JavaScript execution in the parent process. Note: This vulnerability affects Desktop Firefox only, i...
Mozilla Firefox ESR<115.9.1
Mozilla Firefox<124.0.1
redhat/firefox<115.9.1
ubuntu/firefox<124.0.1+
debian/firefox
debian/firefox-esr<=91.12.0esr-1~deb10u1<=115.7.0esr-1~deb11u1<=115.7.0esr-1~deb12u1
The permission prompt input delay could expire while the window is not in focus. This makes it vulnerable to clickjacking by malicious websites. This vulnerability affects Firefox < 124, Firefox ESR <...
Mozilla Firefox<124
redhat/firefox<115.10
redhat/thunderbird<115.10
Mozilla Firefox ESR<115.10
Mozilla Thunderbird<115.10
ubuntu/firefox<124.0+
and 6 more
`AppendEncodedAttributeValue(), ExtraSpaceNeededForAttrEncoding()` and `AppendEncodedCharacters()` could have experienced integer overflows, causing underallocation of an output buffer leading to an o...
Mozilla Firefox<124
Mozilla Firefox ESR<115.9
Mozilla Thunderbird<115.9
redhat/firefox<115.9
redhat/thunderbird<115.9
ubuntu/firefox<124.0+
and 6 more
Using a markup injection an attacker could have stolen nonce values. This could have been used to bypass strict content security policies. This vulnerability affects Firefox < 124, Firefox ESR < 115.9...
Mozilla Firefox<124
Mozilla Firefox ESR<115.9
Mozilla Thunderbird<115.9
redhat/firefox<115.9
redhat/thunderbird<115.9
ubuntu/firefox<124.0+
and 6 more
An attacker could have leveraged the Windows Error Reporter to run arbitrary code on the system escaping the sandbox. *Note:* This issue only affected Windows operating systems. Other operating system...
<115.9
Mozilla Firefox<124
Mozilla Thunderbird<115.9
Security Vulnerabilities fixed in Firefox ESR 115.9
Mozilla Firefox ESR<115.9
To harden ICU against exploitation, the behavior for out-of-memory conditions was changed to crash instead of attempt to continue. This vulnerability affects Firefox ESR < 115.9 and Thunderbird < 115....
Mozilla Firefox ESR<115.9
Mozilla Thunderbird<115.9
redhat/firefox<115.9
redhat/thunderbird<115.9
ubuntu/thunderbird<1:115.9.0+
ubuntu/thunderbird<1:115.9.0+
and 3 more
A missing delay on when pointer lock was used could have allowed a malicious page to trick a user into granting permissions. This vulnerability affects Firefox < 124, Firefox ESR < 115.9, and Thunderb...
Mozilla Firefox<124
Mozilla Firefox ESR<115.9
Mozilla Thunderbird<115.9
redhat/firefox<115.9
redhat/thunderbird<115.9
ubuntu/firefox<124.0+
and 6 more
Return registers were overwritten which could have allowed an attacker to execute arbitrary code. *Note:* This issue only affected Armv7-A systems. Other operating systems are unaffected. This vulnera...
Mozilla Firefox<124
Mozilla Firefox ESR<115.9
Mozilla Thunderbird<115.9
redhat/firefox<115.9
redhat/thunderbird<115.9
ubuntu/firefox<124.0+
and 6 more
If an attacker could find a way to trigger a particular code path in `SafeRefPtr`, it could have triggered a crash or potentially be leveraged to achieve code execution. This vulnerability affects Fir...
Mozilla Firefox<124
Mozilla Firefox ESR<115.9
Mozilla Thunderbird<115.9
redhat/firefox<115.9
redhat/thunderbird<115.9
ubuntu/firefox<124.0+
and 6 more
Memory safety bugs present in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could ...
Mozilla Firefox<124
Mozilla Firefox ESR<115.9
Mozilla Thunderbird<115.9
redhat/firefox<115.9
redhat/thunderbird<115.9
ubuntu/firefox<124.0+
and 6 more
A malicious website could have used a combination of exiting fullscreen mode and `requestPointerLock` to cause the user's mouse to be re-positioned unexpectedly, which could have led to user confusion...
Mozilla Firefox<123
Mozilla Thunderbird<115.8
Mozilla Firefox ESR<115.8
redhat/firefox<115.8
redhat/thunderbird<115.8
ubuntu/firefox<123.0+
and 6 more
A website could have obscured the fullscreen notification by using a dropdown select input element. This could have led to user confusion and possible spoofing attacks. This vulnerability affects Fire...
Mozilla Firefox<123
Mozilla Thunderbird<115.8
Mozilla Firefox ESR<115.8
redhat/firefox<115.8
redhat/thunderbird<115.8
ubuntu/firefox<123.0+
and 6 more
When storing and re-accessing data on a networking channel, the length of buffers may have been confused, resulting in an out-of-bounds memory read. This vulnerability affects Firefox < 123, Firefox E...
Mozilla Firefox<123
Mozilla Thunderbird<115.8
Mozilla Firefox ESR<115.8
redhat/firefox<115.8
redhat/thunderbird<115.8
ubuntu/firefox<123.0+
and 6 more
Security Vulnerabilities fixed in Firefox ESR 115.8
Mozilla Firefox ESR<115.8
If a website set a large custom cursor, portions of the cursor could have overlapped with the permission dialog, potentially resulting in user confusion and unexpected granted permissions. This vulner...
Mozilla Firefox ESR<115.8
Mozilla Firefox<123
Mozilla Thunderbird<115.8
redhat/firefox<115.8
redhat/thunderbird<115.8
ubuntu/firefox<123.0+
and 6 more
Memory safety bugs present in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could ...
Mozilla Thunderbird<115.8
Mozilla Firefox<123
Mozilla Firefox ESR<115.8
redhat/firefox<115.8
redhat/thunderbird<115.8
ubuntu/firefox<123.0+
and 6 more
Incorrect code generation could have led to unexpected numeric conversions and potential undefined behavior.*Note:* This issue only affects 32-bit ARM devices. This vulnerability affects Firefox < 123...
Mozilla Firefox ESR<115.8
Mozilla Firefox<123
Mozilla Thunderbird<115.8
redhat/firefox<115.8
redhat/thunderbird<115.8
ubuntu/firefox<123.0+
and 6 more

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203