Mozilla Firefox vulnerabilities

3,148 known vulnerabilities affecting mozilla/firefox.

Total CVEs
3,148
CISA KEV
17
actively exploited
Public exploits
122
Exploited in wild
22
Severity breakdown
CRITICAL862HIGH921MEDIUM1295LOW70

Vulnerabilities

Page 55 of 158
CVE-2020-6811HIGHCVSS 8.8fixed in 74.0≥ unspecified, < 74+1 more2020-03-25
CVE-2020-6811 [HIGH] CWE-77 CVE-2020-6811: The 'Copy as cURL' feature of Devtools' network tab did not properly escape the HTTP method of a req The 'Copy as cURL' feature of Devtools' network tab did not properly escape the HTTP method of a request, which can be controlled by the website. If a user used the 'Copy as Curl' feature and pasted the command into a terminal, it could have resulted in command injection and arbitrary command execution. This vulnerability affects Thunderbird < 68.6, Fire
nvdmozilla
CVE-2020-6807HIGHCVSS 8.8fixed in 74.0≥ unspecified, < 74+1 more2020-03-25
CVE-2020-6807 [HIGH] CWE-416 CVE-2020-6807: When a device was changed while a stream was about to be destroyed, the <code>stream-reinit</code> t When a device was changed while a stream was about to be destroyed, the stream-reinit task may have been executed after the stream was destroyed, causing a use-after-free and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.6, Firefox < 74, Firefox < ESR68.6, and Firefox ESR < 68.6.
nvdmozilla
CVE-2020-6806HIGHCVSS 8.8fixed in 74.0≥ unspecified, < 74+1 more2020-03-25
CVE-2020-6806 [HIGH] CWE-125 CVE-2020-6806: By carefully crafting promise resolutions, it was possible to cause an out-of-bounds read off the en By carefully crafting promise resolutions, it was possible to cause an out-of-bounds read off the end of an array resized during script execution. This could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.6, Firefox < 74, Firefox < ESR68.6, and Firefox ESR < 68.6.
nvdmozilla
CVE-2020-6812MEDIUMCVSS 5.3fixed in 74.0≥ unspecified, < 74+1 more2020-03-25
CVE-2020-6812 [MEDIUM] CWE-200 CVE-2020-6812: The first time AirPods are connected to an iPhone, they become named after the user's name by defaul The first time AirPods are connected to an iPhone, they become named after the user's name by default (e.g. Jane Doe's AirPods.) Websites with camera or microphone permission are able to enumerate device names, disclosing the user's name. To resolve this issue, Firefox added a special case that renames devices containing the substring 'AirPods' to sim
nvdmozilla
CVE-2020-6813MEDIUMCVSS 5.3fixed in 74.0≥ unspecified, < 742020-03-25
CVE-2020-6813 [MEDIUM] CVE-2020-6813: When protecting CSS blocks with the nonce feature of Content Security Policy, the @import statement When protecting CSS blocks with the nonce feature of Content Security Policy, the @import statement in the CSS block could allow an attacker to inject arbitrary styles, bypassing the intent of the Content Security Policy. This vulnerability affects Firefox < 74.
nvdosvmozilla
CVE-2020-6808MEDIUMCVSS 6.5fixed in 74.0≥ unspecified, < 742020-03-25
CVE-2020-6808 [MEDIUM] CWE-290 CVE-2020-6808: When a JavaScript URL (javascript:) is evaluated and the result is a string, this string is parsed t When a JavaScript URL (javascript:) is evaluated and the result is a string, this string is parsed to create an HTML document, which is then presented. Previously, this document's URL (as reported by the document.location property, for example) was the originating javascript: URL which could lead to spoofing attacks; it is now correctly the URL of the
nvdosvmozilla
CVE-2020-6810MEDIUMCVSS 4.3fixed in 74.0≥ unspecified, < 742020-03-25
CVE-2020-6810 [MEDIUM] CWE-290 CVE-2020-6810: After a website had entered fullscreen mode, it could have used a previously opened popup to obscure After a website had entered fullscreen mode, it could have used a previously opened popup to obscure the notification that indicates the browser is in fullscreen mode. Combined with spoofing the browser chrome, this could have led to confusing the user about the current origin of the page and credential theft or other attacks. This vulnerability affec
nvdosvmozilla
CVE-2019-20503MEDIUMCVSS 6.5≥ 0, < 74.0+build3-0ubuntu0.16.04.1≥ 0, < 74.0+build3-0ubuntu0.18.04.12020-03-11
CVE-2019-20503 [MEDIUM] firefox vulnerabilities firefox vulnerabilities Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, spoof the URL or other browser chrome, obtain sensitive information, bypass Content Security Policy (CSP) protections, or execute arbitrary code. (CVE-2019-20503, CVE-2020-6805, CVE-2020-6806, CVE-2020-6807, CVE-2020-6808, CVE-2020-68
osvmozilla
CVE-2020-6796HIGHCVSS 8.8fixed in 73.0≥ unspecified, < 73+1 more2020-03-02
CVE-2020-6796 [HIGH] CWE-787 CVE-2020-6796: A content process could have modified shared memory relating to crash reporting information, crash i A content process could have modified shared memory relating to crash reporting information, crash itself, and cause an out-of-bound write. This could have caused memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 73 and Firefox < ESR68.5.
nvdmozilla
CVE-2019-17026HIGHCVSS 8.8KEVPoCfixed in 68.4.1fixed in 72.0.1+1 more2020-03-02
CVE-2019-17026 [HIGH] CWE-843 CVE-2019-17026: Incorrect alias information in IonMonkey JIT compiler for setting array elements could lead to a typ Incorrect alias information in IonMonkey JIT compiler for setting array elements could lead to a type confusion. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Firefox ESR < 68.4.1, Thunderbird < 68.4.1, and Firefox < 72.0.1.
nvdmozilla
CVE-2020-6799HIGHCVSS 8.8fixed in 73.0≥ unspecified, < 73+1 more2020-03-02
CVE-2020-6799 [HIGH] CWE-88 CVE-2020-6799: Command line arguments could have been injected during Firefox invocation as a shell handler for cer Command line arguments could have been injected during Firefox invocation as a shell handler for certain unsupported file types. This required Firefox to be configured as the default handler for a given file type and for a file downloaded to be opened in a third party application that insufficiently sanitized URL data. In that situation, clicking a link
nvdmozilla
CVE-2020-6801HIGHCVSS 8.8fixed in 73.0≥ unspecified, < 732020-03-02
CVE-2020-6801 [HIGH] CWE-787 CVE-2020-6801: Mozilla developers reported memory safety bugs present in Firefox 72. Some of these bugs showed evid Mozilla developers reported memory safety bugs present in Firefox 72. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 73.
nvdosvmozilla
CVE-2020-6800HIGHCVSS 8.8fixed in 73.0≥ unspecified, < 73+1 more2020-03-02
CVE-2020-6800 [HIGH] CWE-787 CVE-2020-6800: Mozilla developers and community members reported memory safety bugs present in Firefox 72 and Firef Mozilla developers and community members reported memory safety bugs present in Firefox 72 and Firefox ESR 68.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. In general, these flaws cannot be exploited through email in the Thunderbird product
nvdmozilla
CVE-2020-6797MEDIUMCVSS 4.3fixed in 73.0≥ unspecified, < 73+1 more2020-03-02
CVE-2020-6797 [MEDIUM] CWE-20 CVE-2020-6797: By downloading a file with the .fileloc extension, a semi-privileged extension could launch an arbit By downloading a file with the .fileloc extension, a semi-privileged extension could launch an arbitrary application on the user's computer. The attacker is restricted as they are unable to download non-quarantined files or supply command line arguments to the application, limiting the impact. Note: this issue only occurs on Mac OSX. Other operating sy
nvdmozilla
CVE-2020-6798MEDIUMCVSS 6.1fixed in 73.0≥ unspecified, < 73+1 more2020-03-02
CVE-2020-6798 [MEDIUM] CWE-79 CVE-2020-6798: If a template tag was used in a select tag, the parser could be confused and allow JavaScript parsin If a template tag was used in a select tag, the parser could be confused and allow JavaScript parsing and execution when it should not be allowed. A site that relied on the browser behaving correctly could suffer a cross-site scripting vulnerability as a result. In general, this flaw cannot be exploited through email in the Thunderbird product because
nvdmozilla
CVE-2013-5594MEDIUMCVSS 4.3fixed in 25.0vbefore 20132020-02-18
CVE-2013-5594 [MEDIUM] CWE-1021 CVE-2013-5594: Mozilla Firefox before 25 allows modification of anonymous content of pluginProblem.xml binding Mozilla Firefox before 25 allows modification of anonymous content of pluginProblem.xml binding
nvd
CVE-2011-2668HIGHCVSS 8.8≤ 1.5.0.3v1.5.0.3 and earlier2020-01-21
CVE-2011-2668 [HIGH] CVE-2011-2668: Mozilla Firefox through 1.5.0.3 has a vulnerability in processing the content-length header Mozilla Firefox through 1.5.0.3 has a vulnerability in processing the content-length header
nvd
CVE-2011-2669MEDIUMCVSS 6.5fixed in 3.6vprior to 3.62020-01-21
CVE-2011-2669 [MEDIUM] CWE-295 CVE-2011-2669: Mozilla Firefox prior to 3.6 has a DoS vulnerability due to an issue in the validation of certificat Mozilla Firefox prior to 3.6 has a DoS vulnerability due to an issue in the validation of certificates.
nvd
CVE-2011-2670MEDIUMCVSS 6.1fixed in 3.6vbefore 3.62020-01-13
CVE-2011-2670 [MEDIUM] CWE-79 CVE-2011-2670: Mozilla Firefox before 3.6 is vulnerable to XSS via the rendering of Cascading Style Sheets Mozilla Firefox before 3.6 is vulnerable to XSS via the rendering of Cascading Style Sheets
nvd
CVE-2019-9812CRITICALCVSS 9.3fixed in 60.9fixed in 69.0+2 more2020-01-08
CVE-2019-9812 [CRITICAL] CVE-2019-9812: Given a compromised sandboxed content process due to a separate vulnerability, it is possible to esc Given a compromised sandboxed content process due to a separate vulnerability, it is possible to escape that sandbox by loading accounts.firefox.com in that process and forcing a log-in to a malicious Firefox Sync account. Preference settings that disable the sandbox are then synchronized to the local machine and the compromised browser would restart withou
nvd