VYPR

rpm package

opensuse/mozjs128&distro=openSUSE Tumbleweed

pkg:rpm/opensuse/mozjs128&distro=openSUSE%20Tumbleweed

Vulnerabilities (79)

  • CVE-2025-5268HigMay 27, 2025
    affected < 128.12.0-1.1fixed 128.12.0-1.1

    Memory safety bugs present in Firefox 138, Thunderbird 138, Firefox ESR 128.10, and Thunderbird 128.10. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability

  • CVE-2025-5267MedMay 27, 2025
    affected < 128.12.0-1.1fixed 128.12.0-1.1

    A clickjacking vulnerability could have been used to trick a user into leaking saved payment card details to a malicious page. This vulnerability was fixed in Firefox 139, Firefox ESR 128.11, Thunderbird 139, and Thunderbird 128.11.

  • CVE-2025-5266MedMay 27, 2025
    affected < 128.12.0-1.1fixed 128.12.0-1.1

    Script elements loading cross-origin resources generated load and error events which leaked information enabling XS-Leaks attacks. This vulnerability was fixed in Firefox 139, Firefox ESR 128.11, Thunderbird 139, and Thunderbird 128.11.

  • CVE-2025-5265MedMay 27, 2025
    affected < 128.12.0-1.1fixed 128.12.0-1.1

    Due to insufficient escaping of the ampersand character in the “Copy as cURL” feature, an attacker could trick a user into using this command, potentially leading to local code execution on the user's system. *This bug only affects Firefox for Windows. Other versions of Firefox a

  • CVE-2025-5264MedMay 27, 2025
    affected < 128.12.0-1.1fixed 128.12.0-1.1

    Due to insufficient escaping of the newline character in the “Copy as cURL” feature, an attacker could trick a user into using this command, potentially leading to local code execution on the user's system. This vulnerability was fixed in Firefox 139, Firefox ESR 115.24, Firefox

  • CVE-2025-5263MedMay 27, 2025
    affected < 128.12.0-1.1fixed 128.12.0-1.1

    Error handling for script execution was incorrectly isolated from web content, which could have allowed cross-origin leak attacks. This vulnerability was fixed in Firefox 139, Firefox ESR 115.24, Firefox ESR 128.11, Thunderbird 139, and Thunderbird 128.11.

  • CVE-2025-3028MedApr 1, 2025
    affected < 128.9.0-1.1fixed 128.9.0-1.1

    JavaScript code running while transforming a document with the XSLTProcessor could lead to a use-after-free. This vulnerability was fixed in Firefox 137, Firefox ESR 115.22, Firefox ESR 128.9, Thunderbird 137, and Thunderbird 128.9.

  • CVE-2025-2857CriMar 27, 2025
    affected < 128.8.1-1.1fixed 128.8.1-1.1

    Following the recent Chrome sandbox escape (CVE-2025-2783), various Firefox developers identified a similar pattern in our IPC code. A compromised child process could cause the parent process to return an unintentionally powerful handle, leading to a sandbox escape. The original

  • CVE-2025-1935MedMar 4, 2025
    affected < 128.8.1-1.1fixed 128.8.1-1.1

    A web page could trick a user into setting that site as the default handler for a custom URL protocol. This vulnerability was fixed in Firefox 136, Firefox ESR 128.8, Thunderbird 136, and Thunderbird 128.8.

  • CVE-2025-1931HigMar 4, 2025
    affected < 128.8.1-1.1fixed 128.8.1-1.1

    It was possible to cause a use-after-free in the content process side of a WebTransport connection, leading to a potentially exploitable crash. This vulnerability was fixed in Firefox 136, Firefox ESR 115.21, Firefox ESR 128.8, Thunderbird 136, and Thunderbird 128.8.

  • CVE-2025-1014HigFeb 4, 2025
    affected < 128.7.0-1.1fixed 128.7.0-1.1

    Certificate length was not properly checked when added to a certificate store. In practice only trusted data was processed. This vulnerability was fixed in Firefox 135, Firefox ESR 128.7, Thunderbird 128.7, and Thunderbird 135.

  • CVE-2025-1011HigFeb 4, 2025
    affected < 128.7.0-1.1fixed 128.7.0-1.1

    A bug in WebAssembly code generation could have lead to a crash. It may have been possible for an attacker to leverage this to achieve code execution. This vulnerability was fixed in Firefox 135, Firefox ESR 128.7, Thunderbird 128.7, and Thunderbird 135.

  • CVE-2025-1009CriFeb 4, 2025
    affected < 128.7.0-1.1fixed 128.7.0-1.1

    An attacker could have caused a use-after-free via crafted XSLT data, leading to a potentially exploitable crash. This vulnerability was fixed in Firefox 135, Firefox ESR 115.20, Firefox ESR 128.7, Thunderbird 128.7, and Thunderbird 135.

  • CVE-2025-0243MedJan 7, 2025
    affected < 128.7.0-1.1fixed 128.7.0-1.1

    Memory safety bugs present in Firefox 133, Thunderbird 133, Firefox ESR 128.5, and Thunderbird 128.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability w

  • CVE-2025-0239MedJan 7, 2025
    affected < 128.7.0-1.1fixed 128.7.0-1.1

    When using Alt-Svc, ALPN did not properly validate certificates when the original server is redirecting to an insecure site. This vulnerability was fixed in Firefox 134, Firefox ESR 128.6, Thunderbird 134, and Thunderbird 128.6.

  • CVE-2025-0237MedJan 7, 2025
    affected < 128.7.0-1.1fixed 128.7.0-1.1

    The WebChannel API, which is used to transport various information across processes, did not check the sending principal but rather accepted the principal being sent. This could have led to privilege escalation attacks. This vulnerability was fixed in Firefox 134, Firefox ESR 128

  • CVE-2024-43097Jan 2, 2025
    affected < 128.8.1-1.1fixed 128.8.1-1.1

    In resizeToAtLeast of SkRegion.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

  • CVE-2024-56431Dec 25, 2024
    affected < 128.9.0-2.1fixed 128.9.0-2.1

    oc_huff_tree_unpack in huffdec.c in libtheora in Theora through 1.0 7180717 has an invalid negative left shift. NOTE: this is disputed by third parties because there is no evidence of a security impact, e.g., an application would not crash.

  • CVE-2024-11697Nov 26, 2024
    affected < 128.5.1-1.1fixed 128.5.1-1.1

    When handling keypress events, an attacker may have been able to trick a user into bypassing the "Open Executable File?" confirmation dialog. This could have led to malicious code execution. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thu

  • CVE-2024-11696Nov 26, 2024
    affected < 128.5.1-1.1fixed 128.5.1-1.1

    The application failed to account for exceptions thrown by the `loadManifestFromFile` method during add-on signature verification. This flaw, triggered by an invalid or unsupported extension manifest, could have caused runtime errors that disrupted the signature validation proces