Vulnerabilities > Mozilla > Firefox > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-12-22 | CVE-2022-22755 | Operation on a Resource after Expiration or Release vulnerability in Mozilla Firefox By using XSL Transforms, a malicious webserver could have served a user an XSL document that would continue to execute JavaScript (within the bounds of the same-origin policy) even after the tab was closed. | 8.8 |
2022-12-22 | CVE-2022-22756 | Unspecified vulnerability in Mozilla Firefox If a user was convinced to drag and drop an image to their desktop or other folder, the resulting object could have been changed into an executable script which would have run arbitrary code after the user clicked on it. | 8.8 |
2022-12-22 | CVE-2022-22758 | Cleartext Transmission of Sensitive Information vulnerability in Mozilla Firefox When clicking on a tel: link, USSD codes, specified after a <code>\*</code> character, would be included in the phone number. | 8.8 |
2022-12-22 | CVE-2022-22761 | Unspecified vulnerability in Mozilla Firefox Web-accessible extension pages (pages with a moz-extension:// scheme) were not correctly enforcing the frame-ancestors directive when it was used in the Web Extension's Content Security Policy. | 8.8 |
2022-12-22 | CVE-2022-22763 | Unspecified vulnerability in Mozilla Firefox When a worker is shutdown, it was possible to cause script to run late in the lifecycle, at a point after where it should not be possible. | 8.8 |
2022-12-22 | CVE-2022-22764 | Out-of-bounds Write vulnerability in Mozilla Firefox Mozilla developers Paul Adenot and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 96 and Firefox ESR 91.5. | 8.8 |
2022-12-22 | CVE-2022-26381 | Use After Free vulnerability in Mozilla Firefox An attacker could have caused a use-after-free by forcing a text reflow in an SVG object leading to a potentially exploitable crash. | 8.8 |
2022-12-22 | CVE-2022-26387 | Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Mozilla Firefox When installing an add-on, Firefox verified the signature before prompting the user; but while the user was confirming the prompt, the underlying add-on file could have been modified and Firefox would not have noticed. | 7.5 |
2022-12-22 | CVE-2022-26485 | Use After Free vulnerability in Mozilla products Removing an XSLT parameter during processing could have lead to an exploitable use-after-free. | 8.8 |
2022-12-22 | CVE-2022-28281 | Out-of-bounds Write vulnerability in Mozilla Firefox ESR If a compromised content process sent an unexpected number of WebAuthN Extensions in a Register command to the parent process, an out of bounds write would have occurred leading to memory corruption and a potentially exploitable crash. | 8.8 |