Vulnerabilities > Mozilla > Firefox
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2019-09-27 | CVE-2019-11733 | Improper Authentication vulnerability in Mozilla Firefox When a master password is set, it is required to be entered again before stored passwords can be accessed in the 'Saved Logins' dialog. | 9.8 |
2019-07-23 | CVE-2019-9821 | Use After Free vulnerability in Mozilla Firefox A use-after-free vulnerability can occur in AssertWorkerThread due to a race condition with shared workers. | 8.1 |
2019-07-23 | CVE-2019-9820 | Use After Free vulnerability in Mozilla Firefox ESR A use-after-free vulnerability can occur in the chrome event handler when it is freed while still in use. | 9.8 |
2019-07-23 | CVE-2019-9819 | Type Confusion vulnerability in Mozilla Thunderbird A vulnerability where a JavaScript compartment mismatch can occur while working with the fetch API, resulting in a potentially exploitable crash. | 9.8 |
2019-07-23 | CVE-2019-9818 | Use After Free vulnerability in Mozilla Firefox A race condition is present in the crash generation server used to generate data for the crash reporter. | 8.3 |
2019-07-23 | CVE-2019-9817 | Origin Validation Error vulnerability in Mozilla Thunderbird Images from a different domain can be read using a canvas object in some circumstances. | 5.3 |
2019-07-23 | CVE-2019-9816 | Type Confusion vulnerability in Mozilla Thunderbird A possible vulnerability exists where type confusion can occur when manipulating JavaScript objects in object groups, allowing for the bypassing of security checks within these groups. | 5.9 |
2019-07-23 | CVE-2019-9815 | Information Exposure Through Discrepancy vulnerability in Mozilla Firefox If hyperthreading is not disabled, a timing attack vulnerability exists, similar to previous Spectre attacks. | 8.1 |
2019-07-23 | CVE-2019-9814 | Out-of-bounds Write vulnerability in Mozilla Firefox Mozilla developers and community members reported memory safety bugs present in Firefox 66. | 9.8 |
2019-07-23 | CVE-2019-9811 | Injection vulnerability in multiple products As part of a winning Pwn2Own entry, a researcher demonstrated a sandbox escape by installing a malicious language pack and then opening a browser feature that used the compromised translation. | 8.3 |