CVE-2022-26387
- EPSS 0.08%
- Veröffentlicht 22.12.2022 20:15:22
- Zuletzt bearbeitet 15.04.2025 21:15:46
When installing an add-on, Firefox verified the signature before prompting the user; but while the user was confirming the prompt, the underlying add-on file could have been modified and Firefox would not have noticed. This vulnerability affects Fire...
CVE-2022-26485
- EPSS 5.7%
- Veröffentlicht 22.12.2022 20:15:22
- Zuletzt bearbeitet 04.11.2025 14:35:17
Removing an XSLT parameter during processing could have lead to an exploitable use-after-free. We have had reports of attacks in the wild abusing this flaw. This vulnerability affects Firefox < 97.0.2, Firefox ESR < 91.6.1, Firefox for Android < 97.3...
CVE-2022-26486
- EPSS 4.33%
- Veröffentlicht 22.12.2022 20:15:22
- Zuletzt bearbeitet 04.11.2025 14:35:12
An unexpected message in the WebGPU IPC framework could lead to a use-after-free and exploitable sandbox escape. We have had reports of attacks in the wild abusing this flaw. This vulnerability affects Firefox < 97.0.2, Firefox ESR < 91.6.1, Firefox ...
CVE-2022-26382
- EPSS 0.24%
- Veröffentlicht 22.12.2022 20:15:21
- Zuletzt bearbeitet 16.04.2025 15:15:50
While the text displayed in Autofill tooltips cannot be directly read by JavaScript, the text was rendered using page fonts. Side-channel attacks on the text by using specially crafted fonts could have lead to this text being inferred by the webpage....
CVE-2022-26383
- EPSS 0.19%
- Veröffentlicht 22.12.2022 20:15:21
- Zuletzt bearbeitet 16.04.2025 15:15:51
When resizing a popup after requesting fullscreen access, the popup would not display the fullscreen notification. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
CVE-2022-26384
- EPSS 0.09%
- Veröffentlicht 22.12.2022 20:15:21
- Zuletzt bearbeitet 16.04.2025 15:15:51
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. Thi...
CVE-2022-26385
- EPSS 0.24%
- Veröffentlicht 22.12.2022 20:15:21
- Zuletzt bearbeitet 15.04.2025 21:15:45
In unusual circumstances, an individual thread may outlive the thread's manager during shutdown. This could have led to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox < 98.
CVE-2022-22761
- EPSS 0.17%
- Veröffentlicht 22.12.2022 20:15:20
- Zuletzt bearbeitet 16.04.2025 15:15:49
Web-accessible extension pages (pages with a moz-extension:// scheme) were not correctly enforcing the frame-ancestors directive when it was used in the Web Extension's Content Security Policy. This vulnerability affects Firefox < 97, Thunderbird < 9...
CVE-2022-22762
- EPSS 0.14%
- Veröffentlicht 22.12.2022 20:15:20
- Zuletzt bearbeitet 16.04.2025 15:15:49
Under certain circumstances, a JavaScript alert (or prompt) could have been shown while another website was displayed underneath it. This could have been abused to trick the user. <br>*This bug only affects Firefox for Android. Other operating system...
CVE-2022-22763
- EPSS 0.12%
- Veröffentlicht 22.12.2022 20:15:20
- Zuletzt bearbeitet 16.04.2025 15:15:49
When a worker is shutdown, it was possible to cause script to run late in the lifecycle, at a point after where it should not be possible. This vulnerability affects Firefox < 96, Thunderbird < 91.6, and Firefox ESR < 91.6.