CVE-2022-29909
- EPSS 0.04%
- Published 22.12.2022 20:15:25
- Last modified 16.04.2025 14:15:20
Documents in deeply-nested cross-origin browsing contexts could have obtained permissions granted to the top-level origin, bypassing the existing prompt and wrongfully inheriting the top-level permissions. This vulnerability affects Thunderbird < 91....
CVE-2022-29911
- EPSS 0.11%
- Published 22.12.2022 20:15:25
- Last modified 16.04.2025 14:15:21
An improper implementation of the new iframe sandbox keyword <code>allow-top-navigation-by-user-activation</code> could lead to script execution without <code>allow-scripts</code> being present. This vulnerability affects Thunderbird < 91.9, Firefox ...
CVE-2022-28285
- EPSS 0.13%
- Published 22.12.2022 20:15:24
- Last modified 16.04.2025 14:15:19
When generating the assembly code for <code>MLoadTypedArrayElementHole</code>, an incorrect AliasSet was used. In conjunction with another vulnerability this could have been used for an out of bounds memory read. This vulnerability affects Thunderbir...
CVE-2022-28286
- EPSS 0.14%
- Published 22.12.2022 20:15:24
- Last modified 16.04.2025 14:15:20
Due to a layout change, iframe contents could have been rendered outside of its border. This could have led to user confusion or spoofing attacks. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8.
CVE-2022-28281
- EPSS 8.66%
- Published 22.12.2022 20:15:23
- Last modified 15.04.2025 21:15:46
If a compromised content process sent an unexpected number of WebAuthN Extensions in a Register command to the parent process, an out of bounds write would have occurred leading to memory corruption and a potentially exploitable crash. This vulnerabi...
CVE-2022-28282
- EPSS 6.12%
- Published 22.12.2022 20:15:23
- Last modified 15.04.2025 20:15:35
By using a link with <code>rel="localization"</code> a use-after-free could have been triggered by destroying an object during JavaScript execution and then referencing the object through a freed pointer, leading to a potential exploitable crash. Thi...
CVE-2022-26386
- EPSS 0.09%
- Published 22.12.2022 20:15:22
- Last modified 15.04.2025 21:15:45
Previously Firefox for macOS and Linux would download temporary files to a user-specific directory in <code>/tmp</code>, but this behavior was changed to download them to <code>/tmp</code> where they could be affected by other local users. This behav...
CVE-2022-26387
- EPSS 0.1%
- Published 22.12.2022 20:15:22
- Last modified 15.04.2025 21:15:46
When installing an add-on, Firefox verified the signature before prompting the user; but while the user was confirming the prompt, the underlying add-on file could have been modified and Firefox would not have noticed. This vulnerability affects Fire...
CVE-2022-26485
- EPSS 4.45%
- Published 22.12.2022 20:15:22
- Last modified 06.03.2025 19:48:51
Removing an XSLT parameter during processing could have lead to an exploitable use-after-free. We have had reports of attacks in the wild abusing this flaw. This vulnerability affects Firefox < 97.0.2, Firefox ESR < 91.6.1, Firefox for Android < 97.3...
CVE-2022-26486
- EPSS 2.96%
- Published 22.12.2022 20:15:22
- Last modified 21.03.2025 21:09:05
An unexpected message in the WebGPU IPC framework could lead to a use-after-free and exploitable sandbox escape. We have had reports of attacks in the wild abusing this flaw. This vulnerability affects Firefox < 97.0.2, Firefox ESR < 91.6.1, Firefox ...