Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:alpm/archlinux/firefox@65.0.2-1
purl pkg:alpm/archlinux/firefox@65.0.2-1
Next non-vulnerable version 66.0.1-1
Latest non-vulnerable version 101.0-1
Risk 10.0
Vulnerabilities affecting this package (17)
Vulnerability Summary Fixed by
VCID-23v6-x6d6-buca
Aliases:
CVE-2019-9805
A latent vulnerability exists in the Prio library where data may be read from uninitialized memory for some functions, leading to potential memory corruption.
66.0-1
Affected by 2 other vulnerabilities.
VCID-4555-zn45-mfd8
Aliases:
CVE-2019-9806
A vulnerability exists during authorization prompting for FTP transaction where successive modal prompts are displayed and cannot be immediately dismissed. This allows for a denial of service (DOS) attack.
66.0-1
Affected by 2 other vulnerabilities.
VCID-7aua-26jh-y3cr
Aliases:
CVE-2019-9799
Insufficient bounds checking of data during inter-process communication might allow a compromised content process to be able to read memory from the parent process under certain conditions.
66.0-1
Affected by 2 other vulnerabilities.
VCID-7yw2-2r4n-rugg
Aliases:
CVE-2019-9790
Multiple vulnerabilities have been found in Mozilla Thunderbird and Firefox, the worst of which could lead to the execution of arbitrary code.
66.0-1
Affected by 2 other vulnerabilities.
VCID-a2k9-85qx-u7cy
Aliases:
CVE-2019-9788
Multiple vulnerabilities have been found in Mozilla Thunderbird and Firefox, the worst of which could lead to the execution of arbitrary code.
66.0-1
Affected by 2 other vulnerabilities.
VCID-bxng-uq7z-hubn
Aliases:
CVE-2019-9803
The Upgrade-Insecure-Requests (UIR) specification states that if UIR is enabled through Content Security Policy (CSP), navigation to a same-origin URL must be upgraded to HTTPS. Firefox will incorrectly navigate to an HTTP URL rather than perform the security upgrade requested by the CSP in some circumstances, allowing for potential man-in-the-middle attacks on the linked resources.
66.0-1
Affected by 2 other vulnerabilities.
VCID-drcd-xhd2-27hn
Aliases:
CVE-2019-9793
Multiple vulnerabilities have been found in Mozilla Thunderbird and Firefox, the worst of which could lead to the execution of arbitrary code.
66.0-1
Affected by 2 other vulnerabilities.
VCID-f2z3-egzk-efgj
Aliases:
CVE-2019-9808
If WebRTC permission is requested from documents with data: or blob: URLs, the permission notifications do not properly display the originating domain. The notification states "Unknown origin" as the requestee, leading to user confusion about which site is asking for this permission.
66.0-1
Affected by 2 other vulnerabilities.
VCID-g45q-v1td-9qcz
Aliases:
CVE-2019-9802
If a Sandbox content process is compromised, it can initiate an FTP download which will then use a child process to render the downloaded data. The downloaded data can then be passed to the Chrome process with an arbitrary file length supplied by an attacker, bypassing sandbox protections and allow for a potential memory read of adjacent data from the privileged Chrome process, which may include sensitive data.
66.0-1
Affected by 2 other vulnerabilities.
VCID-gyt6-vfya-pueg
Aliases:
CVE-2019-9807
When arbitrary text is sent over an FTP connection and a page reload is initiated, it is possible to create a modal alert message with this text as the content. This could potentially be used for social engineering attacks.
66.0-1
Affected by 2 other vulnerabilities.
VCID-rhzx-ha7x-dfew
Aliases:
CVE-2019-9791
Multiple vulnerabilities have been found in Mozilla Thunderbird and Firefox, the worst of which could lead to the execution of arbitrary code.
66.0-1
Affected by 2 other vulnerabilities.
VCID-t1cv-pb54-xyge
Aliases:
CVE-2019-9789
Mozilla developers and community members Dragana Damjanovic, Emilio Cobos Álvarez, Henri Sivonen, Narcis Beleuzu, Julian Seward, Marcia Knous, Gary Kwong, Tyson Smith, Yaron Tausky, Ronald Crane, and André Bargull reported memory safety bugs present in Firefox 65. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code.
66.0-1
Affected by 2 other vulnerabilities.
VCID-tff1-6wkz-jyar
Aliases:
CVE-2019-9797
Cross-origin images can be read in violation of the same-origin policy by exporting an image after using createImageBitmap to read the image and then rendering the resulting bitmap image within a canvas element.
66.0-1
Affected by 2 other vulnerabilities.
VCID-vrvn-krwb-d3dr
Aliases:
CVE-2019-9795
Multiple vulnerabilities have been found in Mozilla Thunderbird and Firefox, the worst of which could lead to the execution of arbitrary code.
66.0-1
Affected by 2 other vulnerabilities.
VCID-wwck-cpa8-y3c5
Aliases:
CVE-2019-9792
Multiple vulnerabilities have been found in Mozilla Thunderbird and Firefox, the worst of which could lead to the execution of arbitrary code.
66.0-1
Affected by 2 other vulnerabilities.
VCID-x4sm-zyc1-ffd4
Aliases:
CVE-2019-9796
Multiple vulnerabilities have been found in Mozilla Thunderbird and Firefox, the worst of which could lead to the execution of arbitrary code.
66.0-1
Affected by 2 other vulnerabilities.
VCID-zcdh-q78g-x7gr
Aliases:
CVE-2019-9809
If the source for resources on a page is through an FTP connection, it is possible to trigger a series of modal alert messages for these resources through invalid credentials or locations. These messages cannot be immediately dismissed, allowing for a denial of service (DOS) attack.
66.0-1
Affected by 2 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-07T13:59:08.622781+00:00 Arch Linux Importer Affected by VCID-a2k9-85qx-u7cy https://security.archlinux.org/AVG-925 38.1.0
2026-04-07T13:59:08.611103+00:00 Arch Linux Importer Affected by VCID-t1cv-pb54-xyge https://security.archlinux.org/AVG-925 38.1.0
2026-04-07T13:59:08.598599+00:00 Arch Linux Importer Affected by VCID-7yw2-2r4n-rugg https://security.archlinux.org/AVG-925 38.1.0
2026-04-07T13:59:08.586888+00:00 Arch Linux Importer Affected by VCID-rhzx-ha7x-dfew https://security.archlinux.org/AVG-925 38.1.0
2026-04-07T13:59:08.574915+00:00 Arch Linux Importer Affected by VCID-wwck-cpa8-y3c5 https://security.archlinux.org/AVG-925 38.1.0
2026-04-07T13:59:08.563010+00:00 Arch Linux Importer Affected by VCID-drcd-xhd2-27hn https://security.archlinux.org/AVG-925 38.1.0
2026-04-07T13:59:08.549926+00:00 Arch Linux Importer Affected by VCID-vrvn-krwb-d3dr https://security.archlinux.org/AVG-925 38.1.0
2026-04-07T13:59:08.528150+00:00 Arch Linux Importer Affected by VCID-x4sm-zyc1-ffd4 https://security.archlinux.org/AVG-925 38.1.0
2026-04-07T13:59:08.495418+00:00 Arch Linux Importer Affected by VCID-tff1-6wkz-jyar https://security.archlinux.org/AVG-925 38.1.0
2026-04-07T13:59:08.483370+00:00 Arch Linux Importer Affected by VCID-7aua-26jh-y3cr https://security.archlinux.org/AVG-925 38.1.0
2026-04-07T13:59:08.468991+00:00 Arch Linux Importer Affected by VCID-g45q-v1td-9qcz https://security.archlinux.org/AVG-925 38.1.0
2026-04-07T13:59:08.457082+00:00 Arch Linux Importer Affected by VCID-bxng-uq7z-hubn https://security.archlinux.org/AVG-925 38.1.0
2026-04-07T13:59:08.445437+00:00 Arch Linux Importer Affected by VCID-23v6-x6d6-buca https://security.archlinux.org/AVG-925 38.1.0
2026-04-07T13:59:08.431103+00:00 Arch Linux Importer Affected by VCID-4555-zn45-mfd8 https://security.archlinux.org/AVG-925 38.1.0
2026-04-07T13:59:08.416957+00:00 Arch Linux Importer Affected by VCID-gyt6-vfya-pueg https://security.archlinux.org/AVG-925 38.1.0
2026-04-07T13:59:08.400035+00:00 Arch Linux Importer Affected by VCID-f2z3-egzk-efgj https://security.archlinux.org/AVG-925 38.1.0
2026-04-07T13:59:08.385969+00:00 Arch Linux Importer Affected by VCID-zcdh-q78g-x7gr https://security.archlinux.org/AVG-925 38.1.0
2026-04-01T18:24:30.977801+00:00 Arch Linux Importer Affected by VCID-a2k9-85qx-u7cy https://security.archlinux.org/AVG-925 38.0.0
2026-04-01T18:24:30.954153+00:00 Arch Linux Importer Affected by VCID-t1cv-pb54-xyge https://security.archlinux.org/AVG-925 38.0.0
2026-04-01T18:24:30.930112+00:00 Arch Linux Importer Affected by VCID-7yw2-2r4n-rugg https://security.archlinux.org/AVG-925 38.0.0
2026-04-01T18:24:30.907012+00:00 Arch Linux Importer Affected by VCID-rhzx-ha7x-dfew https://security.archlinux.org/AVG-925 38.0.0
2026-04-01T18:24:30.881245+00:00 Arch Linux Importer Affected by VCID-wwck-cpa8-y3c5 https://security.archlinux.org/AVG-925 38.0.0
2026-04-01T18:24:30.857017+00:00 Arch Linux Importer Affected by VCID-drcd-xhd2-27hn https://security.archlinux.org/AVG-925 38.0.0
2026-04-01T18:24:30.832525+00:00 Arch Linux Importer Affected by VCID-vrvn-krwb-d3dr https://security.archlinux.org/AVG-925 38.0.0
2026-04-01T18:24:30.809497+00:00 Arch Linux Importer Affected by VCID-x4sm-zyc1-ffd4 https://security.archlinux.org/AVG-925 38.0.0
2026-04-01T18:24:30.784427+00:00 Arch Linux Importer Affected by VCID-tff1-6wkz-jyar https://security.archlinux.org/AVG-925 38.0.0
2026-04-01T18:24:30.759420+00:00 Arch Linux Importer Affected by VCID-7aua-26jh-y3cr https://security.archlinux.org/AVG-925 38.0.0
2026-04-01T18:24:30.736676+00:00 Arch Linux Importer Affected by VCID-g45q-v1td-9qcz https://security.archlinux.org/AVG-925 38.0.0
2026-04-01T18:24:30.711247+00:00 Arch Linux Importer Affected by VCID-bxng-uq7z-hubn https://security.archlinux.org/AVG-925 38.0.0
2026-04-01T18:24:30.685912+00:00 Arch Linux Importer Affected by VCID-23v6-x6d6-buca https://security.archlinux.org/AVG-925 38.0.0
2026-04-01T18:24:30.659827+00:00 Arch Linux Importer Affected by VCID-4555-zn45-mfd8 https://security.archlinux.org/AVG-925 38.0.0
2026-04-01T18:24:30.637070+00:00 Arch Linux Importer Affected by VCID-gyt6-vfya-pueg https://security.archlinux.org/AVG-925 38.0.0
2026-04-01T18:24:30.613015+00:00 Arch Linux Importer Affected by VCID-f2z3-egzk-efgj https://security.archlinux.org/AVG-925 38.0.0
2026-04-01T18:24:30.587447+00:00 Arch Linux Importer Affected by VCID-zcdh-q78g-x7gr https://security.archlinux.org/AVG-925 38.0.0