FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2026-03-07 08:40:34 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
5e4d7172-66b8-11ef-b104-b42e991fc52efirefox -- multiple vulnerabilities

security@mozilla.org reports:

  • Firefox adds web-compatibility shims in place of some tracking scripts blocked by Enhanced Tracking Protection. On a site protected by Content Security Policy in "strict-dynamic" mode, an attacker able to inject an HTML element could have used a DOM Clobbering attack on some of the shims and achieved XSS, bypassing the CSP strict-dynamic protection.
  • Form validation popups could capture escape key presses. Therefore, spamming form validation messages could be used to prevent users from exiting full-screen mode.
  • When almost out-of-memory an elliptic curve key which was never allocated could have been freed again.
  • It was possible to move the cursor using pointerlock from an iframe. This allowed moving the cursor outside of the viewport and the Firefox window.

Discovery 2024-08-06
Entry 2024-08-30
firefox
< 129.0,2

CVE-2024-7524
https://nvd.nist.gov/vuln/detail/CVE-2024-7524
CVE-2024-6610
https://nvd.nist.gov/vuln/detail/CVE-2024-6610
CVE-2024-6609
https://nvd.nist.gov/vuln/detail/CVE-2024-6609
CVE-2024-6608
https://nvd.nist.gov/vuln/detail/CVE-2024-6608