# |
CVE ID
|
CWE ID
|
# of Exploits
|
Vulnerability Type(s)
|
Publish Date
|
Update Date
|
Score
|
Gained Access Level
|
Access
|
Complexity
|
Authentication
|
Conf.
|
Integ.
|
Avail.
|
1 |
CVE-2023-32215 |
787 |
|
Mem. Corr. |
2023-06-02 |
2023-06-09 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
Mozilla developers and community members Gabriele Svelto, Andrew Osmond, Emily McDonough, Sebastian Hengst, Andrew McCreight and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 112 and Firefox ESR 102.10. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 113, Firefox ESR < 102.11, and Thunderbird < 102.11. |
2 |
CVE-2023-32213 |
908 |
|
|
2023-06-02 |
2023-06-09 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
When reading a file, an uninitialized value could have been used as read limit. This vulnerability affects Firefox < 113, Firefox ESR < 102.11, and Thunderbird < 102.11. |
3 |
CVE-2023-32212 |
|
|
|
2023-06-02 |
2023-06-09 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
An attacker could have positioned a <code>datalist</code> element to obscure the address bar. This vulnerability affects Firefox < 113, Firefox ESR < 102.11, and Thunderbird < 102.11. |
4 |
CVE-2023-32211 |
|
|
|
2023-06-02 |
2023-06-09 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
A type checking bug would have led to invalid code being compiled. This vulnerability affects Firefox < 113, Firefox ESR < 102.11, and Thunderbird < 102.11. |
5 |
CVE-2023-32207 |
290 |
|
|
2023-06-02 |
2023-06-09 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
A missing delay in popup notifications could have made it possible for an attacker to trick a user into granting permissions. This vulnerability affects Firefox < 113, Firefox ESR < 102.11, and Thunderbird < 102.11. |
6 |
CVE-2023-32206 |
125 |
|
|
2023-06-02 |
2023-06-09 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
An out-of-bound read could have led to a crash in the RLBox Expat driver. This vulnerability affects Firefox < 113, Firefox ESR < 102.11, and Thunderbird < 102.11. |
7 |
CVE-2023-32205 |
|
|
|
2023-06-02 |
2023-06-09 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
In multiple cases browser prompts could have been obscured by popups controlled by content. These could have led to potential user confusion and spoofing attacks. This vulnerability affects Firefox < 113, Firefox ESR < 102.11, and Thunderbird < 102.11. |
8 |
CVE-2023-29550 |
|
|
Mem. Corr. |
2023-06-02 |
2023-06-09 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
Mozilla developers Randell Jesup, Andrew Osmond, Sebastian Hengst, Andrew McCreight, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 111 and Firefox ESR 102.9. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 112, Focus for Android < 112, Firefox ESR < 102.10, Firefox for Android < 112, and Thunderbird < 102.10. |
9 |
CVE-2023-29548 |
|
|
|
2023-06-02 |
2023-06-09 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
A wrong lowering instruction in the ARM64 Ion compiler resulted in a wrong optimization result. This vulnerability affects Firefox < 112, Focus for Android < 112, Firefox ESR < 102.10, Firefox for Android < 112, and Thunderbird < 102.10. |
10 |
CVE-2023-29541 |
116 |
|
|
2023-06-02 |
2023-06-09 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
Firefox did not properly handle downloads of files ending in <code>.desktop</code>, which can be interpreted to run attacker-controlled commands. <br>*This bug only affects Firefox for Linux on certain Distributions. Other operating systems are unaffected, and Mozilla is unable to enumerate all affected Linux Distributions.*. This vulnerability affects Firefox < 112, Focus for Android < 112, Firefox ESR < 102.10, Firefox for Android < 112, and Thunderbird < 102.10. |
11 |
CVE-2023-29539 |
476 |
|
|
2023-06-02 |
2023-06-09 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
When handling the filename directive in the Content-Disposition header, the filename would be truncated if the filename contained a NULL character. This could have led to reflected file download attacks potentially tricking users to install malware. This vulnerability affects Firefox < 112, Focus for Android < 112, Firefox ESR < 102.10, Firefox for Android < 112, and Thunderbird < 102.10. |
12 |
CVE-2023-29536 |
416 |
|
Mem. Corr. |
2023-06-02 |
2023-06-09 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
An attacker could cause the memory manager to incorrectly free a pointer that addresses attacker-controlled memory, resulting in an assertion, memory corruption, or a potentially exploitable crash. This vulnerability affects Firefox < 112, Focus for Android < 112, Firefox ESR < 102.10, Firefox for Android < 112, and Thunderbird < 102.10. |
13 |
CVE-2023-29535 |
|
|
Mem. Corr. |
2023-06-02 |
2023-06-09 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
Following a Garbage Collector compaction, weak maps may have been accessed before they were correctly traced. This resulted in memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 112, Focus for Android < 112, Firefox ESR < 102.10, Firefox for Android < 112, and Thunderbird < 102.10. |
14 |
CVE-2023-29533 |
|
|
|
2023-06-02 |
2023-06-09 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
A website could have obscured the fullscreen notification by using a combination of <code>window.open</code>, fullscreen requests, <code>window.name</code> assignments, and <code>setInterval</code> calls. This could have led to user confusion and possible spoofing attacks. This vulnerability affects Firefox < 112, Focus for Android < 112, Firefox ESR < 102.10, Firefox for Android < 112, and Thunderbird < 102.10. |
15 |
CVE-2023-28176 |
787 |
|
Mem. Corr. |
2023-06-02 |
2023-06-09 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
Mozilla developers Timothy Nikkel, Andrew McCreight, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 110 and Firefox ESR 102.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 111, Firefox ESR < 102.9, and Thunderbird < 102.9. |
16 |
CVE-2023-28164 |
|
|
|
2023-06-02 |
2023-06-09 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
Dragging a URL from a cross-origin iframe that was removed during the drag could have led to user confusion and website spoofing attacks. This vulnerability affects Firefox < 111, Firefox ESR < 102.9, and Thunderbird < 102.9. |
17 |
CVE-2023-28163 |
|
|
|
2023-06-02 |
2023-06-08 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
When downloading files through the Save As dialog on Windows with suggested filenames containing environment variable names, Windows would have resolved those in the context of the current user. <br>*This bug only affects Firefox on Windows. Other versions of Firefox are unaffected.*. This vulnerability affects Firefox < 111, Firefox ESR < 102.9, and Thunderbird < 102.9. |
18 |
CVE-2023-28162 |
704 |
|
|
2023-06-02 |
2023-06-09 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
While implementing AudioWorklets, some code may have casted one type to another, invalid, dynamic type. This could have led to a potentially exploitable crash. This vulnerability affects Firefox < 111, Firefox ESR < 102.9, and Thunderbird < 102.9. |
19 |
CVE-2023-25752 |
|
|
|
2023-06-02 |
2023-06-09 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
When accessing throttled streams, the count of available bytes needed to be checked in the calling function to be within bounds. This may have lead future code to be incorrect and vulnerable. This vulnerability affects Firefox < 111, Firefox ESR < 102.9, and Thunderbird < 102.9. |
20 |
CVE-2023-25751 |
|
|
|
2023-06-02 |
2023-06-08 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
Sometimes, when invalidating JIT code while following an iterator, the newly generated code could be overwritten incorrectly. This could lead to a potentially exploitable crash. This vulnerability affects Firefox < 111, Firefox ESR < 102.9, and Thunderbird < 102.9. |
21 |
CVE-2023-25746 |
787 |
|
Mem. Corr. |
2023-06-02 |
2023-06-08 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
Mozilla developers Philipp and Gabriele Svelto reported memory safety bugs present in Firefox ESR 102.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 102.8 and Firefox ESR < 102.8. |
22 |
CVE-2023-25742 |
|
|
|
2023-06-02 |
2023-06-08 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
When importing a SPKI RSA public key as ECDSA P-256, the key would be handled incorrectly causing the tab to crash. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8. |
23 |
CVE-2023-25739 |
416 |
|
|
2023-06-02 |
2023-06-08 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
Module load requests that failed were not being checked as to whether or not they were cancelled causing a use-after-free in <code>ScriptLoadContext</code>. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8. |
24 |
CVE-2023-25737 |
|
|
|
2023-06-02 |
2023-06-08 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
An invalid downcast from <code>nsTextNode</code> to <code>SVGElement</code> could have lead to undefined behavior. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8. |
25 |
CVE-2023-25735 |
416 |
|
|
2023-06-02 |
2023-06-08 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
Cross-compartment wrappers wrapping a scripted proxy could have caused objects from other compartments to be stored in the main compartment resulting in a use-after-free after unwrapping the proxy. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8. |
26 |
CVE-2023-25732 |
787 |
|
|
2023-06-02 |
2023-06-08 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
When encoding data from an <code>inputStream</code> in <code>xpcom</code> the size of the input being encoded was not correctly calculated potentially leading to an out of bounds memory write. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8. |
27 |
CVE-2023-25730 |
|
|
|
2023-06-02 |
2023-06-08 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
A background script invoking <code>requestFullscreen</code> and then blocking the main thread could force the browser into fullscreen mode indefinitely, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8. |
28 |
CVE-2023-25729 |
|
|
|
2023-06-02 |
2023-06-08 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
Permission prompts for opening external schemes were only shown for <code>ContentPrincipals</code> resulting in extensions being able to open them without user interaction via <code>ExpandedPrincipals</code>. This could lead to further malicious actions such as downloading files or interacting with software already installed on the system. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8. |
29 |
CVE-2023-25728 |
|
|
|
2023-06-02 |
2023-06-08 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
The <code>Content-Security-Policy-Report-Only</code> header could allow an attacker to leak a child iframe's unredacted URI when interaction with that iframe triggers a redirect. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8. |
30 |
CVE-2023-23605 |
787 |
|
Mem. Corr. |
2023-06-02 |
2023-06-08 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
Mozilla developers and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 108 and Firefox ESR 102.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 109, Thunderbird < 102.7, and Firefox ESR < 102.7. |
31 |
CVE-2023-23603 |
|
|
|
2023-06-02 |
2023-06-08 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
Regular expressions used to filter out forbidden properties and values from style directives in calls to <code>console.log</code> weren't accounting for external URLs. Data could then be potentially exfiltrated from the browser. This vulnerability affects Firefox < 109, Thunderbird < 102.7, and Firefox ESR < 102.7. |
32 |
CVE-2023-23602 |
754 |
|
|
2023-06-02 |
2023-06-08 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
A mishandled security check when creating a WebSocket in a WebWorker caused the Content Security Policy connect-src header to be ignored. This could lead to connections to restricted origins from inside WebWorkers. This vulnerability affects Firefox < 109, Thunderbird < 102.7, and Firefox ESR < 102.7. |
33 |
CVE-2023-23601 |
346 |
|
|
2023-06-02 |
2023-06-08 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
Navigations were being allowed when dragging a URL from a cross-origin iframe into the same tab which could lead to website spoofing attacks. This vulnerability affects Firefox < 109, Thunderbird < 102.7, and Firefox ESR < 102.7. |
34 |
CVE-2023-23599 |
116 |
|
|
2023-06-02 |
2023-06-09 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
When copying a network request from the developer tools panel as a curl command the output was not being properly sanitized and could allow arbitrary commands to be hidden within. This vulnerability affects Firefox < 109, Thunderbird < 102.7, and Firefox ESR < 102.7. |
35 |
CVE-2023-23598 |
|
|
|
2023-06-02 |
2023-06-08 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
Due to the Firefox GTK wrapper code's use of text/plain for drag data and GTK treating all text/plain MIMEs containing file URLs as being dragged a website could arbitrarily read a file via a call to <code>DataTransfer.setData</code>. This vulnerability affects Firefox < 109, Thunderbird < 102.7, and Firefox ESR < 102.7. |
36 |
CVE-2023-1945 |
787 |
|
Mem. Corr. |
2023-06-02 |
2023-06-08 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
Unexpected data returned from the Safe Browsing API could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 102.10 and Firefox ESR < 102.10. |
37 |
CVE-2023-0767 |
|
|
|
2023-06-02 |
2023-06-09 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
An attacker could construct a PKCS 12 cert bundle in such a way that could allow for arbitrary memory writes via PKCS 12 Safe Bag attributes being mishandled. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8. |
38 |
CVE-2023-0616 |
400 |
|
|
2023-06-02 |
2023-06-08 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
If a MIME email combines OpenPGP and OpenPGP MIME data in a certain way Thunderbird repeatedly attempts to process and display the message, which could cause Thunderbird's user interface to lock up and no longer respond to the user's actions. An attacker could send a crafted message with this structure to attempt a DoS attack. This vulnerability affects Thunderbird < 102.8. |
39 |
CVE-2023-0547 |
295 |
|
|
2023-06-02 |
2023-06-09 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
OCSP revocation status of recipient certificates was not checked when sending S/Mime encrypted email, and revoked certificates would be accepted. Thunderbird versions from 68 to 102.9.1 were affected by this bug. This vulnerability affects Thunderbird < 102.10. |
40 |
CVE-2023-0430 |
295 |
|
|
2023-06-02 |
2023-06-09 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
Certificate OCSP revocation status was not checked when verifying S/Mime signatures. Mail signed with a revoked certificate would be displayed as having a valid signature. Thunderbird versions from 68 to 102.7.0 were affected by this bug. This vulnerability affects Thunderbird < 102.7.1. |
41 |
CVE-2022-46882 |
416 |
|
|
2022-12-22 |
2023-05-03 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
A use-after-free in WebGL extensions could have led to a potentially exploitable crash. This vulnerability affects Firefox < 107, Firefox ESR < 102.6, and Thunderbird < 102.6. |
42 |
CVE-2022-46881 |
|
|
Mem. Corr. |
2022-12-22 |
2023-05-03 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
An optimization in WebGL was incorrect in some cases, and could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 106, Firefox ESR < 102.6, and Thunderbird < 102.6. |
43 |
CVE-2022-46880 |
416 |
|
|
2022-12-22 |
2023-05-03 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
A missing check related to tex units could have led to a use-after-free and potentially exploitable crash.<br />*Note*: This advisory was added on December 13th, 2022 after we better understood the impact of the issue. The fix was included in the original release of Firefox 105. This vulnerability affects Firefox ESR < 102.6, Firefox < 105, and Thunderbird < 102.6. |
44 |
CVE-2022-46878 |
|
|
Mem. Corr. |
2022-12-22 |
2023-05-03 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
Mozilla developers Randell Jesup, Valentin Gosu, Olli Pettay, and the Mozilla Fuzzing Team reported memory safety bugs present in Thunderbird 102.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 108, Firefox ESR < 102.6, and Thunderbird < 102.6. |
45 |
CVE-2022-46874 |
|
|
Exec Code |
2022-12-22 |
2023-05-03 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
A file with a long filename could have had its filename truncated to remove the valid extension, leaving a malicious extension in its place. This could potentially led to user confusion and the execution of malicious code.<br/>*Note*: This issue was originally included in the advisories for Thunderbird 102.6, but a patch (specific to Thunderbird) was omitted, resulting in it actually being fixed in Thunderbird 102.6.1. This vulnerability affects Firefox < 108, Thunderbird < 102.6.1, Thunderbird < 102.6, and Firefox ESR < 102.6. |
46 |
CVE-2022-45421 |
|
|
Mem. Corr. |
2022-12-22 |
2023-01-04 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
Mozilla developers Andrew McCreight and Gabriele Svelto reported memory safety bugs present in Thunderbird 102.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107. |
47 |
CVE-2022-45420 |
1021 |
|
|
2022-12-22 |
2023-01-04 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
Use tables inside of an iframe, an attacker could have caused iframe contents to be rendered outside the boundaries of the iframe, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107. |
48 |
CVE-2022-45418 |
1021 |
|
|
2022-12-22 |
2023-01-04 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
If a custom mouse cursor is specified in CSS, under certain circumstances the cursor could have been drawn over the browser UI, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107. |
49 |
CVE-2022-45416 |
203 |
|
|
2022-12-22 |
2023-01-04 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
Keyboard events reference strings like "KeyA" that were at fixed, known, and widely-spread addresses. Cache-based timing attacks such as Prime+Probe could have possibly figured out which keys were being pressed. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107. |
50 |
CVE-2022-45414 |
668 |
|
|
2022-12-22 |
2023-01-05 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
If a Thunderbird user quoted from an HTML email, for example by replying to the email, and the email contained either a VIDEO tag with the POSTER attribute or an OBJECT tag with a DATA attribute, a network request to the referenced remote URL was performed, regardless of a configuration to block remote content. An image loaded from the POSTER attribute was shown in the composer window. These issues could have given an attacker additional capabilities when targetting releases that did not yet have a fix for CVE-2022-3033 which was reported around three months ago. This vulnerability affects Thunderbird < 102.5.1. |