Mozilla Mozilla

Do you want an email whenever new security vulnerabilities are reported in any Mozilla product?

Products by Mozilla Sorted by Most Security Vulnerabilities since 2018

Mozilla Firefox649 vulnerabilities
Open source web browser

Mozilla Thunderbird403 vulnerabilities
Email client

Mozilla SeaMonkey171 vulnerabilities
Browser, email and newsgroup client

Mozilla Thunderbird Esr106 vulnerabilities

Mozilla Firefox Mobile19 vulnerabilities

Mozilla4 vulnerabilities

Mozilla Nss3 vulnerabilities

Mozilla Bleach3 vulnerabilities

Mozilla Geckodriver2 vulnerabilities

Mozilla Convict2 vulnerabilities

Mozilla Camino2 vulnerabilities

Mozilla Webthings Gateway2 vulnerabilities

Mozilla Pollbot1 vulnerability

Mozilla Nss Esr1 vulnerability

Mozilla Mozjpeg1 vulnerability

Mozilla Vpn1 vulnerability

Mozilla Hubs Cloud1 vulnerability

Mozilla Hawk1 vulnerability

Mozilla Firefox Os1 vulnerability

Mozilla Bugzilla1 vulnerability

Recent Mozilla Security Advisories

Advisory Title Published
mfsa2022-31 Security Vulnerabilities fixed in Thunderbird 91.12 mfsa2022-31 July 28, 2022
mfsa2022-32 Security Vulnerabilities fixed in Thunderbird 102.1 mfsa2022-32 July 28, 2022
mfsa2022-28 Security Vulnerabilities fixed in Firefox 103 mfsa2022-28 July 26, 2022
mfsa2022-29 Security Vulnerabilities fixed in Firefox ESR 91.12 mfsa2022-29 July 26, 2022
mfsa2022-30 Security Vulnerabilities fixed in Firefox ESR 102.1 mfsa2022-30 July 26, 2022
mfsa2022-27 Security Vulnerabilities fixed in Firefox for iOS 102 mfsa2022-27 June 29, 2022
mfsa2022-24 Security Vulnerabilities fixed in Firefox 102 mfsa2022-24 June 28, 2022
mfsa2022-26 Security Vulnerabilities fixed in Thunderbird 91.11 and Thunderbird 102 mfsa2022-26 June 28, 2022
mfsa2022-25 Security Vulnerabilities fixed in Firefox ESR 91.11 mfsa2022-25 June 28, 2022
mfsa2022-23 Security Vulnerabilities fixed in Firefox for iOS 101 mfsa2022-23 June 1, 2022

@mozilla Tweets

"Why did we choose AI as the topic of this year's #InternetHealth report? Find out on this episode of @TWiT featur… https://t.co/IqUr5wPWfb
Mon Aug 15 16:03:02 +0000 2022

An aerial picture can tell a thousand stories. But *who* gets to tell them? In the latest episode of IRL, we talk… https://t.co/6xOTj1qb2m
Mon Aug 15 15:56:02 +0000 2022

RT @BridgetMarie: The third episode of @mozilla’s podcast IRL drops today! In it, I talk to people who are reclaiming power over their own…
Mon Aug 15 14:16:03 +0000 2022

"I'm sort of like a prophet of doom." #MozillaFellow @brian_obilo shines a light on cyber security threats includi… https://t.co/VrhhPpFVZg
Wed Aug 10 13:40:01 +0000 2022

Reimagine what the future of tech looks like. In collaboration with @HumaneTech_ we explore how better data and pri… https://t.co/8G2OTGCwqS
Tue Aug 09 20:39:00 +0000 2022

By the Year

In 2022 there have been 6 vulnerabilities in Mozilla with an average score of 8.1 out of ten. Last year Mozilla had 157 security vulnerabilities published. Right now, Mozilla is on track to have less security vulnerabilities in 2022 than it did last year. However, the average CVE base score of the vulnerabilities in 2022 is greater by 1.00.

Year Vulnerabilities Average Score
2022 6 8.12
2021 157 7.12
2020 180 7.26
2019 144 7.67
2018 127 7.66

It may take a day or so for new Mozilla vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Mozilla Security Vulnerabilities

Use after free in Codecs in Google Chrome prior to 101.0.4951.41

CVE-2022-1919 8.8 - High - July 28, 2022

Use after free in Codecs in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

Dangling pointer

This affects the package convict before 6.2.3

CVE-2022-21190 9.8 - Critical - May 13, 2022

This affects the package convict before 6.2.3. This is a bypass of [CVE-2022-22143](https://security.snyk.io/vuln/SNYK-JS-CONVICT-2340604). The [fix](https://github.com/mozilla/node-convict/commit/3b86be087d8f14681a9c889d45da7fe3ad9cd880) introduced, relies on the startsWith method and does not prevent the vulnerability: before splitting the path, it checks if it starts with __proto__ or this.constructor.prototype. To bypass this check it's possible to prepend the dangerous paths with any string value followed by a dot, like for example foo.__proto__ or foo.this.constructor.prototype.

Prototype Pollution

Hawk is an HTTP authentication scheme providing mechanisms for making authenticated HTTP requests with partial cryptographic verification of the request and response

CVE-2022-29167 7.5 - High - May 05, 2022

Hawk is an HTTP authentication scheme providing mechanisms for making authenticated HTTP requests with partial cryptographic verification of the request and response, covering the HTTP method, request URI, host, and optionally the request payload. Hawk used a regular expression to parse `Host` HTTP header (`Hawk.utils.parseHost()`), which was subject to regular expression DoS attack - meaning each added character in the attacker's input increases the computation time exponentially. `parseHost()` was patched in `9.0.1` to use built-in `URL` class to parse hostname instead. `Hawk.authenticate()` accepts `options` argument. If that contains `host` and `port`, those would be used instead of a call to `utils.parseHost()`.

Resource Exhaustion

Improved Host header checks to reject requests not sent to a well-known local hostname or IP

CVE-2021-4138 5.3 - Medium - May 02, 2022

Improved Host header checks to reject requests not sent to a well-known local hostname or IP, or the server-specified hostname.

The package convict before 6.2.2 are vulnerable to Prototype Pollution via the convict function due to missing validation of parentKey

CVE-2022-22143 9.8 - Critical - May 01, 2022

The package convict before 6.2.2 are vulnerable to Prototype Pollution via the convict function due to missing validation of parentKey. **Note:** This vulnerability derives from an incomplete fix of another [vulnerability](https://security.snyk.io/vuln/SNYK-JS-CONVICT-1062508)

Prototype Pollution

regex is an implementation of regular expressions for the Rust language

CVE-2022-24713 7.5 - High - March 08, 2022

regex is an implementation of regular expressions for the Rust language. The regex crate features built-in mitigations to prevent denial of service attacks caused by untrusted regexes, or untrusted input matched by trusted regexes. Those (tunable) mitigations already provide sane defaults to prevent attacks. This guarantee is documented and it's considered part of the crate's API. Unfortunately a bug was discovered in the mitigations designed to prevent untrusted regexes to take an arbitrary amount of time during parsing, and it's possible to craft regexes that bypass such mitigations. This makes it possible to perform denial of service attacks by sending specially crafted regexes to services accepting user-controlled, untrusted regexes. All versions of the regex crate before or equal to 1.5.4 are affected by this issue. The fix is include starting from regex 1.5.5. All users accepting user-controlled regexes are recommended to upgrade immediately to the latest version of the regex crate. Unfortunately there is no fixed set of problematic regexes, as there are practically infinite regexes that could be crafted to exploit this vulnerability. Because of this, it us not recommend to deny known problematic regexes.

Resource Exhaustion

regex is an implementation of regular expressions for the Rust language

CVE-2022-24713 7.5 - High - March 08, 2022

regex is an implementation of regular expressions for the Rust language. The regex crate features built-in mitigations to prevent denial of service attacks caused by untrusted regexes, or untrusted input matched by trusted regexes. Those (tunable) mitigations already provide sane defaults to prevent attacks. This guarantee is documented and it's considered part of the crate's API. Unfortunately a bug was discovered in the mitigations designed to prevent untrusted regexes to take an arbitrary amount of time during parsing, and it's possible to craft regexes that bypass such mitigations. This makes it possible to perform denial of service attacks by sending specially crafted regexes to services accepting user-controlled, untrusted regexes. All versions of the regex crate before or equal to 1.5.4 are affected by this issue. The fix is include starting from regex 1.5.5. All users accepting user-controlled regexes are recommended to upgrade immediately to the latest version of the regex crate. Unfortunately there is no fixed set of problematic regexes, as there are practically infinite regexes that could be crafted to exploit this vulnerability. Because of this, it us not recommend to deny known problematic regexes.

Resource Exhaustion

regex is an implementation of regular expressions for the Rust language

CVE-2022-24713 7.5 - High - March 08, 2022

regex is an implementation of regular expressions for the Rust language. The regex crate features built-in mitigations to prevent denial of service attacks caused by untrusted regexes, or untrusted input matched by trusted regexes. Those (tunable) mitigations already provide sane defaults to prevent attacks. This guarantee is documented and it's considered part of the crate's API. Unfortunately a bug was discovered in the mitigations designed to prevent untrusted regexes to take an arbitrary amount of time during parsing, and it's possible to craft regexes that bypass such mitigations. This makes it possible to perform denial of service attacks by sending specially crafted regexes to services accepting user-controlled, untrusted regexes. All versions of the regex crate before or equal to 1.5.4 are affected by this issue. The fix is include starting from regex 1.5.5. All users accepting user-controlled regexes are recommended to upgrade immediately to the latest version of the regex crate. Unfortunately there is no fixed set of problematic regexes, as there are practically infinite regexes that could be crafted to exploit this vulnerability. Because of this, it us not recommend to deny known problematic regexes.

Resource Exhaustion

The olm_session_describe function in Matrix libolm before 3.2.7 is vulnerable to a buffer overflow

CVE-2021-44538 9.8 - Critical - December 14, 2021

The olm_session_describe function in Matrix libolm before 3.2.7 is vulnerable to a buffer overflow. The Olm session object represents a cryptographic channel between two parties. Therefore, its state is partially controllable by the remote party of the channel. Attackers can construct a crafted sequence of messages to manipulate the state of the receiver's session in such a way that, for some buffer sizes, a buffer overflow happens on a call to olm_session_describe. Furthermore, safe buffer sizes were undocumented. The overflow content is partially controllable by the attacker and limited to ASCII spaces and digits. The known affected products are Element Web And SchildiChat Web.

Classic Buffer Overflow

By misusing a race in our notification code, an attacker could have forcefully hidden the notification for pages

CVE-2021-43538 4.3 - Medium - December 08, 2021

By misusing a race in our notification code, an attacker could have forcefully hidden the notification for pages that had received full screen and pointer lock access, which could have been used for spoofing attacks. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.

Race Condition

When a user loaded a Web Extensions context menu, the Web Extension could access the post-redirect URL of the element clicked

CVE-2021-43531 4.3 - Medium - December 08, 2021

When a user loaded a Web Extensions context menu, the Web Extension could access the post-redirect URL of the element clicked. If the Web Extension lacked the WebRequest permission for the hosts involved in the redirect, this would be a same-origin-violation leaking data the Web Extension should have access to. This was fixed to provide the pre-redirect URL. This is related to CVE-2021-43532 but in the context of Web Extensions. This vulnerability affects Firefox < 94.

Origin Validation Error

The 'Copy Image Link' context menu action would copy the final image URL after redirects

CVE-2021-43532 6.1 - Medium - December 08, 2021

The 'Copy Image Link' context menu action would copy the final image URL after redirects. By embedding an image that triggered authentication flows - in conjunction with a Content Security Policy that stopped a redirection chain in the middle - the final image URL could be one that contained an authentication token used to takeover a user account. If a website tricked a user into copy and pasting the image link back to the page, the page would be able to steal the authentication tokens. This was fixed by making the action return the original URL, before any redirects. This vulnerability affects Firefox < 94.

Open Redirect

Mozilla developers and community members reported memory safety bugs present in Firefox 93 and Firefox ESR 91.2

CVE-2021-43534 8.8 - High - December 08, 2021

Mozilla developers and community members reported memory safety bugs present in Firefox 93 and Firefox ESR 91.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3.

Memory Corruption

An incorrect type conversion of sizes from 64bit to 32bit integers

CVE-2021-43537 8.8 - High - December 08, 2021

An incorrect type conversion of sizes from 64bit to 32bit integers allowed an attacker to corrupt memory leading to a potentially exploitable crash. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.

Incorrect Type Conversion or Cast

Failure to correctly record the location of live pointers across wasm instance calls resulted in a GC occurring within the call not tracing those live pointers

CVE-2021-43539 8.8 - High - December 08, 2021

Failure to correctly record the location of live pointers across wasm instance calls resulted in a GC occurring within the call not tracing those live pointers. This could have led to a use-after-free causing a potentially exploitable crash. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.

Dangling pointer

WebExtensions with the correct permissions were able to create and install ServiceWorkers for third-party websites

CVE-2021-43540 6.5 - Medium - December 08, 2021

WebExtensions with the correct permissions were able to create and install ServiceWorkers for third-party websites that would not have been uninstalled with the extension. This vulnerability affects Firefox < 95.

When invoking protocol handlers for external protocols, a supplied parameter URL containing spaces was not properly escaped

CVE-2021-43541 6.5 - Medium - December 08, 2021

When invoking protocol handlers for external protocols, a supplied parameter URL containing spaces was not properly escaped. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.

Using XMLHttpRequest, an attacker could have identified installed applications by probing error messages for loading external protocols

CVE-2021-43542 6.5 - Medium - December 08, 2021

Using XMLHttpRequest, an attacker could have identified installed applications by probing error messages for loading external protocols. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.

Generation of Error Message Containing Sensitive Information

Documents loaded with the CSP sandbox directive could have escaped the sandbox's script restriction by embedding additional content

CVE-2021-43543 6.1 - Medium - December 08, 2021

Documents loaded with the CSP sandbox directive could have escaped the sandbox's script restriction by embedding additional content. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.

XSS

When receiving a URL through a SEND intent, Firefox would have searched for the text, but subsequent usages of the address bar might have caused the URL to load unintentionally

CVE-2021-43544 6.1 - Medium - December 08, 2021

When receiving a URL through a SEND intent, Firefox would have searched for the text, but subsequent usages of the address bar might have caused the URL to load unintentionally, which could lead to XSS and spoofing attacks. *This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 95.

XSS

Using the Location API in a loop could have caused severe application hangs and crashes

CVE-2021-43545 6.5 - Medium - December 08, 2021

Using the Location API in a loop could have caused severe application hangs and crashes. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.

Excessive Iteration

It was possible to recreate previous cursor spoofing attacks against users with a zoomed native cursor

CVE-2021-43546 4.3 - Medium - December 08, 2021

It was possible to recreate previous cursor spoofing attacks against users with a zoomed native cursor. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.

Clickjacking

A use-after-free could have occured when an HTTP2 session object was released on a different thread

CVE-2021-43535 8.8 - High - December 08, 2021

A use-after-free could have occured when an HTTP2 session object was released on a different thread, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 93, Thunderbird < 91.3, and Firefox ESR < 91.3.

Dangling pointer

When parsing internationalized domain names, high bits of the characters in the URLs were sometimes stripped, resulting in inconsistencies

CVE-2021-43533 4.3 - Medium - December 08, 2021

When parsing internationalized domain names, high bits of the characters in the URLs were sometimes stripped, resulting in inconsistencies that could lead to user confusion or attacks such as phishing. This vulnerability affects Firefox < 94.

Under certain circumstances, asynchronous functions could have caused a navigation to fail but expose the target URL

CVE-2021-43536 6.5 - Medium - December 08, 2021

Under certain circumstances, asynchronous functions could have caused a navigation to fail but expose the target URL. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.

Exposure of Resource to Wrong Sphere

It was possible to recreate previous cursor spoofing attacks against users with a zoomed native cursor

CVE-2021-43546 4.3 - Medium - December 08, 2021

It was possible to recreate previous cursor spoofing attacks against users with a zoomed native cursor. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.

Clickjacking

Using the Location API in a loop could have caused severe application hangs and crashes

CVE-2021-43545 6.5 - Medium - December 08, 2021

Using the Location API in a loop could have caused severe application hangs and crashes. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.

Excessive Iteration

Documents loaded with the CSP sandbox directive could have escaped the sandbox's script restriction by embedding additional content

CVE-2021-43543 6.1 - Medium - December 08, 2021

Documents loaded with the CSP sandbox directive could have escaped the sandbox's script restriction by embedding additional content. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.

XSS

Using XMLHttpRequest, an attacker could have identified installed applications by probing error messages for loading external protocols

CVE-2021-43542 6.5 - Medium - December 08, 2021

Using XMLHttpRequest, an attacker could have identified installed applications by probing error messages for loading external protocols. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.

Generation of Error Message Containing Sensitive Information

When invoking protocol handlers for external protocols, a supplied parameter URL containing spaces was not properly escaped

CVE-2021-43541 6.5 - Medium - December 08, 2021

When invoking protocol handlers for external protocols, a supplied parameter URL containing spaces was not properly escaped. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.

Failure to correctly record the location of live pointers across wasm instance calls resulted in a GC occurring within the call not tracing those live pointers

CVE-2021-43539 8.8 - High - December 08, 2021

Failure to correctly record the location of live pointers across wasm instance calls resulted in a GC occurring within the call not tracing those live pointers. This could have led to a use-after-free causing a potentially exploitable crash. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.

Dangling pointer

By misusing a race in our notification code, an attacker could have forcefully hidden the notification for pages

CVE-2021-43538 4.3 - Medium - December 08, 2021

By misusing a race in our notification code, an attacker could have forcefully hidden the notification for pages that had received full screen and pointer lock access, which could have been used for spoofing attacks. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.

Race Condition

An incorrect type conversion of sizes from 64bit to 32bit integers

CVE-2021-43537 8.8 - High - December 08, 2021

An incorrect type conversion of sizes from 64bit to 32bit integers allowed an attacker to corrupt memory leading to a potentially exploitable crash. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.

Incorrect Type Conversion or Cast

Under certain circumstances, asynchronous functions could have caused a navigation to fail but expose the target URL

CVE-2021-43536 6.5 - Medium - December 08, 2021

Under certain circumstances, asynchronous functions could have caused a navigation to fail but expose the target URL. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.

Exposure of Resource to Wrong Sphere

Thunderbird unexpectedly enabled JavaScript in the composition area

CVE-2021-43528 6.5 - Medium - December 08, 2021

Thunderbird unexpectedly enabled JavaScript in the composition area. The JavaScript execution context was limited to this area and did not receive chrome-level privileges, but could be used as a stepping stone to further an attack with other vulnerabilities. This vulnerability affects Thunderbird < 91.4.0.

Improper Privilege Management

It was possible to recreate previous cursor spoofing attacks against users with a zoomed native cursor

CVE-2021-43546 4.3 - Medium - December 08, 2021

It was possible to recreate previous cursor spoofing attacks against users with a zoomed native cursor. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.

Clickjacking

Using the Location API in a loop could have caused severe application hangs and crashes

CVE-2021-43545 6.5 - Medium - December 08, 2021

Using the Location API in a loop could have caused severe application hangs and crashes. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.

Excessive Iteration

Documents loaded with the CSP sandbox directive could have escaped the sandbox's script restriction by embedding additional content

CVE-2021-43543 6.1 - Medium - December 08, 2021

Documents loaded with the CSP sandbox directive could have escaped the sandbox's script restriction by embedding additional content. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.

XSS

Using XMLHttpRequest, an attacker could have identified installed applications by probing error messages for loading external protocols

CVE-2021-43542 6.5 - Medium - December 08, 2021

Using XMLHttpRequest, an attacker could have identified installed applications by probing error messages for loading external protocols. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.

Generation of Error Message Containing Sensitive Information

When invoking protocol handlers for external protocols, a supplied parameter URL containing spaces was not properly escaped

CVE-2021-43541 6.5 - Medium - December 08, 2021

When invoking protocol handlers for external protocols, a supplied parameter URL containing spaces was not properly escaped. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.

Failure to correctly record the location of live pointers across wasm instance calls resulted in a GC occurring within the call not tracing those live pointers

CVE-2021-43539 8.8 - High - December 08, 2021

Failure to correctly record the location of live pointers across wasm instance calls resulted in a GC occurring within the call not tracing those live pointers. This could have led to a use-after-free causing a potentially exploitable crash. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.

Dangling pointer

By misusing a race in our notification code, an attacker could have forcefully hidden the notification for pages

CVE-2021-43538 4.3 - Medium - December 08, 2021

By misusing a race in our notification code, an attacker could have forcefully hidden the notification for pages that had received full screen and pointer lock access, which could have been used for spoofing attacks. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.

Race Condition

An incorrect type conversion of sizes from 64bit to 32bit integers

CVE-2021-43537 8.8 - High - December 08, 2021

An incorrect type conversion of sizes from 64bit to 32bit integers allowed an attacker to corrupt memory leading to a potentially exploitable crash. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.

Incorrect Type Conversion or Cast

Under certain circumstances, asynchronous functions could have caused a navigation to fail but expose the target URL

CVE-2021-43536 6.5 - Medium - December 08, 2021

Under certain circumstances, asynchronous functions could have caused a navigation to fail but expose the target URL. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.

Exposure of Resource to Wrong Sphere

NSS (Network Security Services) versions prior to 3.73 or 3.68.1 ESR are vulnerable to a heap overflow when handling DER-encoded DSA or RSA-PSS signatures

CVE-2021-43527 9.8 - Critical - December 08, 2021

NSS (Network Security Services) versions prior to 3.73 or 3.68.1 ESR are vulnerable to a heap overflow when handling DER-encoded DSA or RSA-PSS signatures. Applications using NSS for handling signatures encoded within CMS, S/MIME, PKCS \#7, or PKCS \#12 are likely to be impacted. Applications using NSS for certificate validation or other TLS, X.509, OCSP or CRL functionality may be impacted, depending on how they configure NSS. *Note: This vulnerability does NOT impact Mozilla Firefox.* However, email clients and PDF viewers that use NSS for signature verification, such as Thunderbird, LibreOffice, Evolution and Evince are believed to be impacted. This vulnerability affects NSS < 3.73 and NSS < 3.68.1.

Memory Corruption

The executable file warning was not presented when downloading .inetloc files

CVE-2021-38510 8.8 - High - December 08, 2021

The executable file warning was not presented when downloading .inetloc files, which, due to a flaw in Mac OS, can run commands on a user's computer.*Note: This issue only affected Mac OS operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3.

Due to an unusual sequence of attacker-controlled events

CVE-2021-38509 4.3 - Medium - December 08, 2021

Due to an unusual sequence of attacker-controlled events, a Javascript alert() dialog with arbitrary (although unstyled) contents could be displayed over top an uncontrolled webpage of the attacker's choosing. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3.

Clickjacking

By displaying a form validity message in the correct location at the same time as a permission prompt (such as for geolocation)

CVE-2021-38508 4.3 - Medium - December 08, 2021

By displaying a form validity message in the correct location at the same time as a permission prompt (such as for geolocation), the validity message could have obscured the prompt, resulting in the user potentially being tricked into granting the permission. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3.

Clickjacking

The Opportunistic Encryption feature of HTTP2 (RFC 8164)

CVE-2021-38507 6.5 - Medium - December 08, 2021

The Opportunistic Encryption feature of HTTP2 (RFC 8164) allows a connection to be transparently upgraded to TLS while retaining the visual properties of an HTTP connection, including being same-origin with unencrypted connections on port 80. However, if a second encrypted port on the same IP address (e.g. port 8443) did not opt-in to opportunistic encryption; a network attacker could forward a connection from the browser to port 443 to port 8443, causing the browser to treat the content of port 8443 as same-origin with HTTP. This was resolved by disabling the Opportunistic Encryption feature, which had low usage. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3.

Origin Validation Error

Through a series of navigations, Firefox could have entered fullscreen mode without notification or warning to the user

CVE-2021-38506 4.3 - Medium - December 08, 2021

Through a series of navigations, Firefox could have entered fullscreen mode without notification or warning to the user. This could lead to spoofing attacks on the browser UI including phishing. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3.

Clickjacking

Microsoft introduced a new feature in Windows 10 known as Cloud Clipboard

CVE-2021-38505 6.5 - Medium - December 08, 2021

Microsoft introduced a new feature in Windows 10 known as Cloud Clipboard which, if enabled, will record data copied to the clipboard to the cloud, and make it available on other computers in certain scenarios. Applications that wish to prevent copied data from being recorded in Cloud History must use specific clipboard formats; and Firefox before versions 94 and ESR 91.3 did not implement them. This could have caused sensitive data to be recorded to a user's Microsoft account. *This bug only affects Firefox for Windows 10+ with Cloud Clipboard enabled. Other operating systems are unaffected.*. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3.

Exposure of Resource to Wrong Sphere

When interacting with an HTML input element's file picker dialog with webkitdirectory set

CVE-2021-38504 8.8 - High - December 08, 2021

When interacting with an HTML input element's file picker dialog with webkitdirectory set, a use-after-free could have resulted, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3.

Dangling pointer

The iframe sandbox rules were not correctly applied to XSLT stylesheets

CVE-2021-38503 10 - Critical - December 08, 2021

The iframe sandbox rules were not correctly applied to XSLT stylesheets, allowing an iframe to bypass restrictions such as executing scripts or navigating the top-level frame. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3.

AuthZ

The executable file warning was not presented when downloading .inetloc files

CVE-2021-38510 8.8 - High - December 08, 2021

The executable file warning was not presented when downloading .inetloc files, which, due to a flaw in Mac OS, can run commands on a user's computer.*Note: This issue only affected Mac OS operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3.

Due to an unusual sequence of attacker-controlled events

CVE-2021-38509 4.3 - Medium - December 08, 2021

Due to an unusual sequence of attacker-controlled events, a Javascript alert() dialog with arbitrary (although unstyled) contents could be displayed over top an uncontrolled webpage of the attacker's choosing. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3.

Clickjacking

By displaying a form validity message in the correct location at the same time as a permission prompt (such as for geolocation)

CVE-2021-38508 4.3 - Medium - December 08, 2021

By displaying a form validity message in the correct location at the same time as a permission prompt (such as for geolocation), the validity message could have obscured the prompt, resulting in the user potentially being tricked into granting the permission. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3.

Clickjacking

The Opportunistic Encryption feature of HTTP2 (RFC 8164)

CVE-2021-38507 6.5 - Medium - December 08, 2021

The Opportunistic Encryption feature of HTTP2 (RFC 8164) allows a connection to be transparently upgraded to TLS while retaining the visual properties of an HTTP connection, including being same-origin with unencrypted connections on port 80. However, if a second encrypted port on the same IP address (e.g. port 8443) did not opt-in to opportunistic encryption; a network attacker could forward a connection from the browser to port 443 to port 8443, causing the browser to treat the content of port 8443 as same-origin with HTTP. This was resolved by disabling the Opportunistic Encryption feature, which had low usage. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3.

Origin Validation Error

Through a series of navigations, Firefox could have entered fullscreen mode without notification or warning to the user

CVE-2021-38506 4.3 - Medium - December 08, 2021

Through a series of navigations, Firefox could have entered fullscreen mode without notification or warning to the user. This could lead to spoofing attacks on the browser UI including phishing. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3.

Clickjacking

Microsoft introduced a new feature in Windows 10 known as Cloud Clipboard

CVE-2021-38505 6.5 - Medium - December 08, 2021

Microsoft introduced a new feature in Windows 10 known as Cloud Clipboard which, if enabled, will record data copied to the clipboard to the cloud, and make it available on other computers in certain scenarios. Applications that wish to prevent copied data from being recorded in Cloud History must use specific clipboard formats; and Firefox before versions 94 and ESR 91.3 did not implement them. This could have caused sensitive data to be recorded to a user's Microsoft account. *This bug only affects Firefox for Windows 10+ with Cloud Clipboard enabled. Other operating systems are unaffected.*. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3.

Exposure of Resource to Wrong Sphere

When interacting with an HTML input element's file picker dialog with webkitdirectory set

CVE-2021-38504 8.8 - High - December 08, 2021

When interacting with an HTML input element's file picker dialog with webkitdirectory set, a use-after-free could have resulted, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3.

Dangling pointer

The iframe sandbox rules were not correctly applied to XSLT stylesheets

CVE-2021-38503 10 - Critical - December 08, 2021

The iframe sandbox rules were not correctly applied to XSLT stylesheets, allowing an iframe to bypass restrictions such as executing scripts or navigating the top-level frame. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3.

AuthZ

The executable file warning was not presented when downloading .inetloc files

CVE-2021-38510 8.8 - High - December 08, 2021

The executable file warning was not presented when downloading .inetloc files, which, due to a flaw in Mac OS, can run commands on a user's computer.*Note: This issue only affected Mac OS operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3.

Due to an unusual sequence of attacker-controlled events

CVE-2021-38509 4.3 - Medium - December 08, 2021

Due to an unusual sequence of attacker-controlled events, a Javascript alert() dialog with arbitrary (although unstyled) contents could be displayed over top an uncontrolled webpage of the attacker's choosing. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3.

Clickjacking

By displaying a form validity message in the correct location at the same time as a permission prompt (such as for geolocation)

CVE-2021-38508 4.3 - Medium - December 08, 2021

By displaying a form validity message in the correct location at the same time as a permission prompt (such as for geolocation), the validity message could have obscured the prompt, resulting in the user potentially being tricked into granting the permission. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3.

Clickjacking

The Opportunistic Encryption feature of HTTP2 (RFC 8164)

CVE-2021-38507 6.5 - Medium - December 08, 2021

The Opportunistic Encryption feature of HTTP2 (RFC 8164) allows a connection to be transparently upgraded to TLS while retaining the visual properties of an HTTP connection, including being same-origin with unencrypted connections on port 80. However, if a second encrypted port on the same IP address (e.g. port 8443) did not opt-in to opportunistic encryption; a network attacker could forward a connection from the browser to port 443 to port 8443, causing the browser to treat the content of port 8443 as same-origin with HTTP. This was resolved by disabling the Opportunistic Encryption feature, which had low usage. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3.

Origin Validation Error

Through a series of navigations, Firefox could have entered fullscreen mode without notification or warning to the user

CVE-2021-38506 4.3 - Medium - December 08, 2021

Through a series of navigations, Firefox could have entered fullscreen mode without notification or warning to the user. This could lead to spoofing attacks on the browser UI including phishing. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3.

Clickjacking

Microsoft introduced a new feature in Windows 10 known as Cloud Clipboard

CVE-2021-38505 6.5 - Medium - December 08, 2021

Microsoft introduced a new feature in Windows 10 known as Cloud Clipboard which, if enabled, will record data copied to the clipboard to the cloud, and make it available on other computers in certain scenarios. Applications that wish to prevent copied data from being recorded in Cloud History must use specific clipboard formats; and Firefox before versions 94 and ESR 91.3 did not implement them. This could have caused sensitive data to be recorded to a user's Microsoft account. *This bug only affects Firefox for Windows 10+ with Cloud Clipboard enabled. Other operating systems are unaffected.*. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3.

Exposure of Resource to Wrong Sphere

When interacting with an HTML input element's file picker dialog with webkitdirectory set

CVE-2021-38504 8.8 - High - December 08, 2021

When interacting with an HTML input element's file picker dialog with webkitdirectory set, a use-after-free could have resulted, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3.

Dangling pointer

The iframe sandbox rules were not correctly applied to XSLT stylesheets

CVE-2021-38503 10 - Critical - December 08, 2021

The iframe sandbox rules were not correctly applied to XSLT stylesheets, allowing an iframe to bypass restrictions such as executing scripts or navigating the top-level frame. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3.

AuthZ

Mozilla developers reported memory safety bugs present in Firefox 92 and Firefox ESR 91.1

CVE-2021-38500 8.8 - High - November 03, 2021

Mozilla developers reported memory safety bugs present in Firefox 92 and Firefox ESR 91.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 78.15, Thunderbird < 91.2, Firefox ESR < 91.2, Firefox ESR < 78.15, and Firefox < 93.

Firefox incorrectly accepted a newline in a HTTP/3 header, interpretting it as two separate headers

CVE-2021-29991 8.1 - High - November 03, 2021

Firefox incorrectly accepted a newline in a HTTP/3 header, interpretting it as two separate headers. This allowed for a header splitting attack against servers using HTTP/3. This vulnerability affects Firefox < 91.0.1 and Thunderbird < 91.0.1.

HTTP Request Smuggling

When delegating navigations to the operating system, Firefox would accept the `mk` scheme which might

CVE-2021-38492 6.5 - Medium - November 03, 2021

When delegating navigations to the operating system, Firefox would accept the `mk` scheme which might allow attackers to launch pages and execute scripts in Internet Explorer in unprivileged mode. *This bug only affects Firefox for Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox < 92, Thunderbird < 91.1, Thunderbird < 78.14, Firefox ESR < 78.14, and Firefox ESR < 91.1.

Mozilla developers reported memory safety bugs present in Thunderbird 78.13.0

CVE-2021-38495 8.8 - High - November 03, 2021

Mozilla developers reported memory safety bugs present in Thunderbird 78.13.0. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 91.1 and Firefox ESR < 91.1.

Memory Corruption

When delegating navigations to the operating system, Firefox would accept the `mk` scheme which might

CVE-2021-38492 6.5 - Medium - November 03, 2021

When delegating navigations to the operating system, Firefox would accept the `mk` scheme which might allow attackers to launch pages and execute scripts in Internet Explorer in unprivileged mode. *This bug only affects Firefox for Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox < 92, Thunderbird < 91.1, Thunderbird < 78.14, Firefox ESR < 78.14, and Firefox ESR < 91.1.

Mozilla developers reported memory safety bugs present in Firefox 91 and Firefox ESR 78.13

CVE-2021-38493 8.8 - High - November 03, 2021

Mozilla developers reported memory safety bugs present in Firefox 91 and Firefox ESR 78.13. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 78.14, Thunderbird < 78.14, and Firefox < 92.

Memory Corruption

Firefox for Android allowed navigations through the `intent://` protocol, which could be used to cause crashes and UI spoofs

CVE-2021-29993 8.1 - High - November 03, 2021

Firefox for Android allowed navigations through the `intent://` protocol, which could be used to cause crashes and UI spoofs. *This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 92.

Mixed-content checks were unable to analyze opaque origins which led to some mixed content being loaded

CVE-2021-38491 6.5 - Medium - November 03, 2021

Mixed-content checks were unable to analyze opaque origins which led to some mixed content being loaded. This vulnerability affects Firefox < 92.

When delegating navigations to the operating system, Firefox would accept the `mk` scheme which might

CVE-2021-38492 6.5 - Medium - November 03, 2021

When delegating navigations to the operating system, Firefox would accept the `mk` scheme which might allow attackers to launch pages and execute scripts in Internet Explorer in unprivileged mode. *This bug only affects Firefox for Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox < 92, Thunderbird < 91.1, Thunderbird < 78.14, Firefox ESR < 78.14, and Firefox ESR < 91.1.

Mozilla developers reported memory safety bugs present in Firefox 91 and Firefox ESR 78.13

CVE-2021-38493 8.8 - High - November 03, 2021

Mozilla developers reported memory safety bugs present in Firefox 91 and Firefox ESR 78.13. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 78.14, Thunderbird < 78.14, and Firefox < 92.

Memory Corruption

Mozilla developers reported memory safety bugs present in Firefox 91

CVE-2021-38494 8.8 - High - November 03, 2021

Mozilla developers reported memory safety bugs present in Firefox 91. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 92.

Memory Corruption

When delegating navigations to the operating system, Firefox would accept the `mk` scheme which might

CVE-2021-38492 6.5 - Medium - November 03, 2021

When delegating navigations to the operating system, Firefox would accept the `mk` scheme which might allow attackers to launch pages and execute scripts in Internet Explorer in unprivileged mode. *This bug only affects Firefox for Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox < 92, Thunderbird < 91.1, Thunderbird < 78.14, Firefox ESR < 78.14, and Firefox ESR < 91.1.

Mozilla developers reported memory safety bugs present in Firefox 91 and Firefox ESR 78.13

CVE-2021-38493 8.8 - High - November 03, 2021

Mozilla developers reported memory safety bugs present in Firefox 91 and Firefox ESR 78.13. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 78.14, Thunderbird < 78.14, and Firefox < 92.

Memory Corruption

When delegating navigations to the operating system, Firefox would accept the `mk` scheme which might

CVE-2021-38492 6.5 - Medium - November 03, 2021

When delegating navigations to the operating system, Firefox would accept the `mk` scheme which might allow attackers to launch pages and execute scripts in Internet Explorer in unprivileged mode. *This bug only affects Firefox for Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox < 92, Thunderbird < 91.1, Thunderbird < 78.14, Firefox ESR < 78.14, and Firefox ESR < 91.1.

Mozilla developers reported memory safety bugs present in Thunderbird 78.13.0

CVE-2021-38495 8.8 - High - November 03, 2021

Mozilla developers reported memory safety bugs present in Thunderbird 78.13.0. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 91.1 and Firefox ESR < 91.1.

Memory Corruption

During operations on MessageTasks

CVE-2021-38496 8.8 - High - November 03, 2021

During operations on MessageTasks, a task may have been removed while it was still scheduled, resulting in memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 78.15, Thunderbird < 91.2, Firefox ESR < 91.2, Firefox ESR < 78.15, and Firefox < 93.

Dangling pointer

Through use of reportValidity() and window.open()

CVE-2021-38497 6.5 - Medium - November 03, 2021

Through use of reportValidity() and window.open(), a plain-text validation message could have been overlaid on another origin, leading to possible user confusion and spoofing attacks. This vulnerability affects Firefox < 93, Thunderbird < 91.2, and Firefox ESR < 91.2.

Origin Validation Error

During process shutdown

CVE-2021-38498 7.5 - High - November 03, 2021

During process shutdown, a document could have caused a use-after-free of a languages service object, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 93, Thunderbird < 91.2, and Firefox ESR < 91.2.

Dangling pointer

Mozilla developers reported memory safety bugs present in Firefox 92 and Firefox ESR 91.1

CVE-2021-38500 8.8 - High - November 03, 2021

Mozilla developers reported memory safety bugs present in Firefox 92 and Firefox ESR 91.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 78.15, Thunderbird < 91.2, Firefox ESR < 91.2, Firefox ESR < 78.15, and Firefox < 93.

Mozilla developers reported memory safety bugs present in Firefox 92 and Firefox ESR 91.1

CVE-2021-38501 8.8 - High - November 03, 2021

Mozilla developers reported memory safety bugs present in Firefox 92 and Firefox ESR 91.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 93, Thunderbird < 91.2, and Firefox ESR < 91.2.

Mozilla developers reported memory safety bugs present in Firefox 92 and Firefox ESR 91.1

CVE-2021-38500 8.8 - High - November 03, 2021

Mozilla developers reported memory safety bugs present in Firefox 92 and Firefox ESR 91.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 78.15, Thunderbird < 91.2, Firefox ESR < 91.2, Firefox ESR < 78.15, and Firefox < 93.

Mozilla developers reported memory safety bugs present in Firefox 92 and Firefox ESR 91.1

CVE-2021-38500 8.8 - High - November 03, 2021

Mozilla developers reported memory safety bugs present in Firefox 92 and Firefox ESR 91.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 78.15, Thunderbird < 91.2, Firefox ESR < 91.2, Firefox ESR < 78.15, and Firefox < 93.

During operations on MessageTasks

CVE-2021-38496 8.8 - High - November 03, 2021

During operations on MessageTasks, a task may have been removed while it was still scheduled, resulting in memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 78.15, Thunderbird < 91.2, Firefox ESR < 91.2, Firefox ESR < 78.15, and Firefox < 93.

Dangling pointer

Mozilla developers reported memory safety bugs present in Firefox 92 and Firefox ESR 91.1

CVE-2021-38501 8.8 - High - November 03, 2021

Mozilla developers reported memory safety bugs present in Firefox 92 and Firefox ESR 91.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 93, Thunderbird < 91.2, and Firefox ESR < 91.2.

During process shutdown

CVE-2021-38498 7.5 - High - November 03, 2021

During process shutdown, a document could have caused a use-after-free of a languages service object, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 93, Thunderbird < 91.2, and Firefox ESR < 91.2.

Dangling pointer

Through use of reportValidity() and window.open()

CVE-2021-38497 6.5 - Medium - November 03, 2021

Through use of reportValidity() and window.open(), a plain-text validation message could have been overlaid on another origin, leading to possible user confusion and spoofing attacks. This vulnerability affects Firefox < 93, Thunderbird < 91.2, and Firefox ESR < 91.2.

Origin Validation Error

During operations on MessageTasks

CVE-2021-38496 8.8 - High - November 03, 2021

During operations on MessageTasks, a task may have been removed while it was still scheduled, resulting in memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 78.15, Thunderbird < 91.2, Firefox ESR < 91.2, Firefox ESR < 78.15, and Firefox < 93.

Dangling pointer

Thunderbird ignored the configuration to require STARTTLS security for an SMTP connection

CVE-2021-38502 5.9 - Medium - November 03, 2021

Thunderbird ignored the configuration to require STARTTLS security for an SMTP connection. A MITM could perform a downgrade attack to intercept transmitted messages, or could take control of the authenticated session to execute SMTP commands chosen by the MITM. If an unprotected authentication method was configured, the MITM could obtain the authentication credentials, too. This vulnerability affects Thunderbird < 91.2.

Mozilla developers reported memory safety bugs present in Firefox 92

CVE-2021-38499 8.8 - High - November 03, 2021

Mozilla developers reported memory safety bugs present in Firefox 92. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 93.

Memory Corruption

Mozilla developers reported memory safety bugs present in Firefox 92 and Firefox ESR 91.1

CVE-2021-38500 8.8 - High - November 03, 2021

Mozilla developers reported memory safety bugs present in Firefox 92 and Firefox ESR 91.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 78.15, Thunderbird < 91.2, Firefox ESR < 91.2, Firefox ESR < 78.15, and Firefox < 93.

Mozilla developers reported memory safety bugs present in Firefox 92 and Firefox ESR 91.1

CVE-2021-38501 8.8 - High - November 03, 2021

Mozilla developers reported memory safety bugs present in Firefox 92 and Firefox ESR 91.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 93, Thunderbird < 91.2, and Firefox ESR < 91.2.

Built by Foundeo Inc., with data from the National Vulnerability Database (NVD), Icons by Icons8. Privacy Policy. Use of this site is governed by the Legal Terms
Disclaimer
CONTENT ON THIS WEBSITE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. Always check with your vendor for the most up to date, and accurate information.