Filtered by vendor Mozilla
Subscribe
Total
2782 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2019-9820 | 1 Mozilla | 3 Firefox, Firefox Esr, Thunderbird | 2019-07-26 | 7.5 HIGH | 9.8 CRITICAL |
A use-after-free vulnerability can occur in the chrome event handler when it is freed while still in use. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7. | |||||
CVE-2019-11692 | 1 Mozilla | 3 Firefox, Firefox Esr, Thunderbird | 2019-07-25 | 7.5 HIGH | 9.8 CRITICAL |
A use-after-free vulnerability can occur when listeners are removed from the event listener manager while still in use, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7. | |||||
CVE-2011-1300 | 3 Google, Microsoft, Mozilla | 3 Chrome, Windows, Firefox | 2019-07-18 | 10.0 HIGH | N/A |
The Program::getActiveUniformMaxLength function in libGLESv2/Program.cpp in libGLESv2.dll in the WebGLES library in Almost Native Graphics Layer Engine (ANGLE), as used in Mozilla Firefox 4.x before 4.0.1 on Windows and in the GPU process in Google Chrome before 10.0.648.205 on Windows, allows remote attackers to execute arbitrary code via unspecified vectors, related to an "off-by-three" error. | |||||
CVE-2019-9796 | 1 Mozilla | 3 Firefox, Firefox Esr, Thunderbird | 2019-06-26 | 7.5 HIGH | 9.8 CRITICAL |
A use-after-free vulnerability can occur when the SMIL animation controller incorrectly registers with the refresh driver twice when only a single registration is expected. When a registration is later freed with the removal of the animation controller element, the refresh driver incorrectly leaves a dangling pointer to the driver's observer array. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66. | |||||
CVE-2016-9896 | 1 Mozilla | 1 Firefox | 2019-06-25 | 6.8 MEDIUM | 8.1 HIGH |
Use-after-free while manipulating the "navigator" object within WebVR. Note: WebVR is not currently enabled by default. This vulnerability affects Firefox < 50.1. | |||||
CVE-2018-18511 | 1 Mozilla | 1 Firefox | 2019-06-10 | 4.3 MEDIUM | 4.3 MEDIUM |
Cross-origin images can be read from a canvas element in violation of the same-origin policy using the transferFromImageBitmap method. *Note: This only affects Firefox 65. Previous versions are unaffected.*. This vulnerability affects Firefox < 65.0.1. | |||||
CVE-2019-9797 | 1 Mozilla | 1 Firefox | 2019-06-10 | 5.0 MEDIUM | 5.3 MEDIUM |
Cross-origin images can be read in violation of the same-origin policy by exporting an image after using createImageBitmap to read the image and then rendering the resulting bitmap image within a canvas element. This vulnerability affects Firefox < 66. | |||||
CVE-2018-18509 | 1 Mozilla | 1 Thunderbird | 2019-06-03 | 5.0 MEDIUM | 5.3 MEDIUM |
A flaw during verification of certain S/MIME signatures causes emails to be shown in Thunderbird as having a valid digital signature, even if the shown message contents aren't covered by the signature. The flaw allows an attacker to reuse a valid S/MIME signature to craft an email message with arbitrary content. This vulnerability affects Thunderbird < 60.5.1. | |||||
CVE-2019-9790 | 1 Mozilla | 3 Firefox, Firefox Esr, Thunderbird | 2019-05-13 | 7.5 HIGH | 9.8 CRITICAL |
A use-after-free vulnerability can occur when a raw pointer to a DOM element on a page is obtained using JavaScript and the element is then removed while still in use. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66. | |||||
CVE-2019-9793 | 1 Mozilla | 3 Firefox, Firefox Esr, Thunderbird | 2019-05-13 | 4.3 MEDIUM | 5.9 MEDIUM |
A mechanism was discovered that removes some bounds checking for string, array, or typed array accesses if Spectre mitigations have been disabled. This vulnerability could allow an attacker to create an arbitrary value in compiled JavaScript, for which the range analysis will infer a fully controlled, incorrect range in circumstances where users have explicitly disabled Spectre mitigations. *Note: Spectre mitigations are currently enabled for all users by default settings.*. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66. | |||||
CVE-2018-5123 | 1 Mozilla | 1 Bugzilla | 2019-05-08 | 6.8 MEDIUM | 8.8 HIGH |
A third party website can access information available to a user with access to a restricted bug entry using the image generation in report.cgi in all Bugzilla versions prior to 4.4. | |||||
CVE-2019-9803 | 1 Mozilla | 1 Firefox | 2019-04-30 | 5.8 MEDIUM | 7.4 HIGH |
The Upgrade-Insecure-Requests (UIR) specification states that if UIR is enabled through Content Security Policy (CSP), navigation to a same-origin URL must be upgraded to HTTPS. Firefox will incorrectly navigate to an HTTP URL rather than perform the security upgrade requested by the CSP in some circumstances, allowing for potential man-in-the-middle attacks on the linked resources. This vulnerability affects Firefox < 66. | |||||
CVE-2019-9804 | 2 Apple, Mozilla | 2 Mac Os X, Firefox | 2019-04-30 | 7.5 HIGH | 9.8 CRITICAL |
In Firefox Developer Tools it is possible that pasting the result of the 'Copy as cURL' command into a command shell on macOS will cause the execution of unintended additional bash script commands if the URL was maliciously crafted. This is the result of an issue with the native version of Bash on macOS. *Note: This issue only affects macOS. Other operating systems are unaffected.*. This vulnerability affects Firefox < 66. | |||||
CVE-2019-9801 | 2 Microsoft, Mozilla | 4 Windows, Firefox, Firefox Esr and 1 more | 2019-04-29 | 5.0 MEDIUM | 5.3 MEDIUM |
Firefox will accept any registered Program ID as an external protocol handler and offer to launch this local application when given a matching URL on Windows operating systems. This should only happen if the program has specifically registered itself as a "URL Handler" in the Windows registry. *Note: This issue only affects Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66. | |||||
CVE-2019-9807 | 1 Mozilla | 1 Firefox | 2019-04-29 | 4.3 MEDIUM | 4.3 MEDIUM |
When arbitrary text is sent over an FTP connection and a page reload is initiated, it is possible to create a modal alert message with this text as the content. This could potentially be used for social engineering attacks. This vulnerability affects Firefox < 66. | |||||
CVE-2019-9808 | 1 Mozilla | 1 Firefox | 2019-04-29 | 5.0 MEDIUM | 5.3 MEDIUM |
If WebRTC permission is requested from documents with data: or blob: URLs, the permission notifications do not properly display the originating domain. The notification states "Unknown origin" as the requestee, leading to user confusion about which site is asking for this permission. This vulnerability affects Firefox < 66. | |||||
CVE-2019-9809 | 1 Mozilla | 1 Firefox | 2019-04-29 | 5.0 MEDIUM | 7.5 HIGH |
If the source for resources on a page is through an FTP connection, it is possible to trigger a series of modal alert messages for these resources through invalid credentials or locations. These messages cannot be immediately dismissed, allowing for a denial of service (DOS) attack. This vulnerability affects Firefox < 66. | |||||
CVE-2019-9806 | 1 Mozilla | 1 Firefox | 2019-04-29 | 5.0 MEDIUM | 7.5 HIGH |
A vulnerability exists during authorization prompting for FTP transaction where successive modal prompts are displayed and cannot be immediately dismissed. This allows for a denial of service (DOS) attack. This vulnerability affects Firefox < 66. | |||||
CVE-2018-5124 | 1 Mozilla | 1 Firefox | 2019-04-29 | 4.3 MEDIUM | 6.1 MEDIUM |
Unsanitized output in the browser UI leaves HTML tags in place and can result in arbitrary code execution in Firefox before version 58.0.1. | |||||
CVE-2018-18512 | 1 Mozilla | 1 Thunderbird | 2019-04-26 | 7.5 HIGH | 9.8 CRITICAL |
A use-after-free vulnerability can occur while playing a sound notification in Thunderbird. The memory storing the sound data is immediately freed, although the sound is still being played asynchronously, leading to a potentially exploitable crash. This vulnerability affects Thunderbird < 60.5. |