Latest Mozilla Vulnerabilities

In certain scenarios a malicious website could attempt to display a fake location URL bar which could mislead users as to the actual website address
Mozilla Firefox=127
Apple iOS
Security Vulnerabilities fixed in Firefox for iOS 127
Mozilla Firefox=127
Apple iOS
Security Vulnerabilities fixed in Firefox ESR 115.12
Mozilla Thunderbird<115.12
When browsing private tabs, some data related to location history or webpage thumbnails could be persisted incorrectly within the sandboxed app bundle after app termination
Mozilla Firefox=127
Apple iOS
Security Vulnerabilities fixed in Firefox ESR 115.12
Mozilla Firefox ESR<115.12
Offscreen Canvas did not properly track cross-origin tainting, which could be used to access image data from another site in violation of same-origin policy.
Mozilla Firefox<127
Mozilla Firefox ESR<115.12
Mozilla Thunderbird<115.12
redhat/firefox<115.12
By tricking the browser with a `X-Frame-Options` header, a sandboxed iframe could have presented a button that, if clicked by a user, would bypass restrictions to open a new window. External Referenc...
Mozilla Firefox<127
Mozilla Firefox ESR<115.12
Mozilla Thunderbird<115.12
redhat/firefox<115.12
Security Vulnerabilities fixed in Firefox 127
Mozilla Firefox<127
If an out-of-memory condition occurs at a specific point using allocations in the probabilistic heap checker, an assertion could have been triggered, and in rarer situations, memory corruption could h...
Mozilla Firefox<127
If a garbage collection was triggered at the right time, a use-after-free could have occurred during object transplant.
Mozilla Firefox<127
Mozilla Firefox ESR<115.12
Mozilla Thunderbird<115.12
redhat/firefox<115.12
Memory safety bugs present in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these coul...
Mozilla Firefox<127
Mozilla Firefox ESR<115.12
Mozilla Thunderbird<115.12
redhat/firefox<115.12
If a specific sequence of actions is performed when opening a new tab, the triggering principal associated with the new tab may have been incorrect. The triggering principal is used to calculate many ...
Mozilla Firefox<127
In violation of spec, cookie prefixes such as __Secure were being ignored if they were not correctly capitalized - by spec they should be checked with a case-insensitive comparison. This could have re...
Mozilla Firefox<127
An attacker could have caused a use-after-free in the JavaScript engine to read memory in the JavaScript string section of the heap.
Mozilla Firefox<127
By manipulating the text in an `&lt;input&gt;` tag, an attacker could have caused corrupt memory leading to a potentially exploitable crash. External Reference: <a href="https://www.mozilla.org/en-US...
Mozilla Firefox ESR<115.12
Mozilla Firefox<127
Mozilla Thunderbird<115.12
redhat/firefox<115.12
By manipulating the fullscreen feature while opening a data-list, an attacker could have overlaid a text box over the address bar. This could have led to user confusion and possible spoofing attacks.
Mozilla Firefox<127
Memory safety bugs present in Firefox 126. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
Mozilla Firefox<127
In addition to detecting when a user was taking a screenshot (XXX), a website was able to overlay the 'My Shots' button that appeared, and direct the user to a replica Firefox Screenshots page that co...
Mozilla Firefox<127
A website was able to detect when a user took a screenshot of a page using the built-in Screenshot functionality in Firefox.
Mozilla Firefox<127
On Windows 10, when using the 'Save As' functionality, an attacker could have tricked the browser into saving the file with a disallowed extension such as .url by including an invalid character in the...
Mozilla Firefox<127
Mozilla Firefox ESR<115.12
Mozilla Thunderbird<115.12
By monitoring the time certain operations take, an attacker could have guessed which external protocol handlers were functional on a user's system.
Mozilla Firefox<127
Mozilla Firefox ESR<115.12
Mozilla Thunderbird<115.12
redhat/firefox<115.12
Security Vulnerabilities fixed in Focus for iOS 126
Mozilla Focus=126
Apple iOS
The file scheme of URLs would be hidden, resulting in potential spoofing of a website's address in the location bar
Mozilla Focus=126
Apple iOS
Security Vulnerabilities fixed in Thunderbird 115.11
Mozilla Thunderbird<115.11
Memory safety bugs present in Firefox 125. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code....
ubuntu/firefox<126.0+
Mozilla Firefox<126
debian/firefox
Memory safety bugs present in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these coul...
Mozilla Firefox ESR<115.11
Mozilla Thunderbird<115.11
ubuntu/firefox<126.0+
ubuntu/thunderbird<1:115.11.0+
ubuntu/thunderbird<1:115.11.0+
ubuntu/thunderbird<1:115.11.0+
and 6 more
Web application manifests were stored by using an insecure MD5 hash which allowed for a hash collision to overwrite another application's manifest. This could have been exploited to run arbitrary code...
Mozilla Firefox<126
Security Vulnerabilities fixed in Firefox 126
Mozilla Firefox<126
An iterator stop condition was missing when handling WASM code in the built-in profiler, potentially leading to invalid memory access and undefined behavior. *Note:* This issue only affects the applic...
ubuntu/firefox<126.0+
Mozilla Firefox<126
debian/firefox
When importing resources using Web Workers, error messages would distinguish the difference between `application/javascript` responses and non-script responses. This could have been abused to learn in...
Mozilla Firefox ESR<115.11
Mozilla Thunderbird<115.11
Mozilla Firefox<126
ubuntu/firefox<126.0+
ubuntu/thunderbird<1:115.11.0+
ubuntu/thunderbird<1:115.11.0+
and 6 more
A file dialog shown while in full-screen mode could have resulted in the window remaining disabled. This vulnerability affects Firefox < 126.
ubuntu/firefox<126.0+
Mozilla Firefox<126
debian/firefox
Different techniques existed to obscure the fullscreen notification in Firefox for Android. These could have lead to potential user confusion and spoofing attacks. *This bug only affects Firefox for ...
Mozilla Firefox<126
When saving a page to PDF, certain font styles could have led to a potential use-after-free crash. This vulnerability affects Firefox < 126, Firefox ESR < 115.11, and Thunderbird < 115.11.
Mozilla Firefox ESR<115.11
Mozilla Thunderbird<115.11
ubuntu/firefox<126.0+
ubuntu/thunderbird<1:115.11.0+
ubuntu/thunderbird<1:115.11.0+
ubuntu/thunderbird<1:115.11.0+
and 6 more
A memory allocation check was missing which would lead to a use-after-free if the allocation failed. This could have triggered a crash or potentially be leveraged to achieve code execution. This vulne...
ubuntu/firefox<126.0+
Mozilla Firefox<126
debian/firefox
Multiple WebRTC threads could have claimed a newly connected audio input leading to use-after-free. This vulnerability affects Firefox < 126.
ubuntu/firefox<126.0+
Mozilla Firefox<126
debian/firefox
A bug in popup notifications' interaction with WebAuthn made it easier for an attacker to trick a user into granting permissions. This vulnerability affects Firefox < 126, Firefox ESR < 115.11, and Th...
Mozilla Firefox ESR<115.11
Mozilla Thunderbird<115.11
ubuntu/firefox<126.0+
ubuntu/thunderbird<1:115.11.0+
ubuntu/thunderbird<1:115.11.0+
ubuntu/thunderbird<1:115.11.0+
and 6 more
When a network error occurred during page load, the prior content could have remained in view with a blank URL bar. This could have been used to obfuscate a spoofed web site. This vulnerability affect...
ubuntu/firefox<126.0+
Mozilla Firefox<126
debian/firefox
If the `browser.privatebrowsing.autostart` preference is enabled, IndexedDB files were not properly deleted when the window was closed. This preference is disabled by default in Firefox. This vulnerab...
Mozilla Firefox ESR<115.11
Mozilla Thunderbird<115.11
ubuntu/firefox<126.0+
ubuntu/thunderbird<1:115.11.0+
ubuntu/thunderbird<1:115.11.0+
ubuntu/thunderbird<1:115.11.0+
and 6 more
Security Vulnerabilities fixed in Firefox ESR 115.11
Mozilla Firefox ESR<115.11
The `ShmemCharMapHashEntry()` code was susceptible to potentially undefined behavior by bypassing the move semantics for one of its data members. This vulnerability affects Firefox < 126.
ubuntu/firefox<126.0+
Mozilla Firefox<126
debian/firefox
An HTTP digest authentication nonce value was generated using `rand()` which could lead to predictable values. This vulnerability affects Firefox < 126.
ubuntu/firefox<126.0+
Mozilla Firefox<126
debian/firefox
### Impact If pdf.js is used to load a malicious PDF, and PDF.js is configured with `isEvalSupported` set to `true` (which is the default value), unrestricted attacker-controlled JavaScript will be ex...
Mozilla Firefox ESR<115.11
npm/pdfjs-dist<=4.1.392
Mozilla Thunderbird<115.11
ubuntu/firefox<126.0+
ubuntu/thunderbird<1:115.11.0+
ubuntu/thunderbird<1:115.11.0+
and 8 more
Security Vulnerabilities fixed in Thunderbird 115.10
Mozilla Thunderbird<115.10
Security Vulnerabilities fixed in Firefox ESR 115.10
Mozilla Firefox ESR<115.10
In certain cases the JIT incorrectly optimized MSubstr operations, which led to out-of-bounds reads. This vulnerability affects Firefox < 125.
ubuntu/firefox<125.0.2+
debian/firefox
Mozilla Firefox<125
GetBoundName could return the wrong version of an object when JIT optimizations were applied. This vulnerability affects Firefox < 125, Firefox ESR < 115.10, and Thunderbird < 115.10.
redhat/firefox<115.10
redhat/thunderbird<115.10
Mozilla Firefox ESR<115.10
Mozilla Thunderbird<115.10
ubuntu/firefox<125.0.2+
ubuntu/thunderbird<1:115.10.1+
and 6 more
Memory corruption in the networking stack could have led to a potentially exploitable crash.
Mozilla Firefox ESR<115.12
Mozilla Thunderbird<115.12
Mozilla Firefox<125
redhat/firefox<115.12
Memory safety bug present in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9. This bug showed evidence of memory corruption and we presume that with enough effort this could have been exploited ...
redhat/firefox<115.10
redhat/thunderbird<115.10
Mozilla Firefox ESR<115.10
Mozilla Thunderbird<115.10
ubuntu/firefox<125.0.2+
ubuntu/thunderbird<1:115.10.1+
and 6 more
Memory safety bugs present in Firefox 124. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code....
ubuntu/firefox<125.0.2+
debian/firefox
Mozilla Firefox<125
If an AlignedBuffer were assigned to itself, the subsequent self-move could result in an incorrect reference count and later use-after-free. This vulnerability affects Firefox < 125, Firefox ESR < 115...
redhat/firefox<115.10
redhat/thunderbird<115.10
Mozilla Firefox ESR<115.10
Mozilla Thunderbird<115.10
ubuntu/firefox<125.0.2+
ubuntu/thunderbird<1:115.10.1+
and 6 more

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203