Search for packages
purl | pkg:alpm/archlinux/firefox@74.0.1-1 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-44s1-9g8d-bbam
Aliases: CVE-2020-6823 |
A malicious extension could have called browser.identity.launchWebAuthFlow, controlling the redirect_uri, and through the Promise returned, obtain the Auth code and gain access to the user's account at the service provider. |
Affected by 8 other vulnerabilities. |
VCID-5dzc-dujk-97de
Aliases: CVE-2020-6824 |
Initially, a user opens a Private Browsing Window and generates a password for a site, then closes the Private Browsing Window but leaves Firefox open. Subsequently, if the user had opened a new Private Browsing Window, revisited the same site, and generated a new password - the generated passwords would have been identical, rather than independent. |
Affected by 8 other vulnerabilities. |
VCID-kj7s-t8f7-c7gq
Aliases: CVE-2020-6826 |
Mozilla developers Tyson Smith, Bob Clary, and Alexandru Michis reported memory safety bugs present in Firefox 74. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. |
Affected by 8 other vulnerabilities. |
VCID-n6v5-na4s-j7ed
Aliases: CVE-2020-6825 |
Mozilla developers and community members Tyson Smith and Christian Holler reported memory safety bugs present in Firefox 74 and Firefox ESR 68.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. |
Affected by 8 other vulnerabilities. |
VCID-u4b2-jwjp-b3dn
Aliases: CVE-2020-6821 |
When reading from areas partially or fully outside the source resource with WebGL's copyTexSubImage method, the specification requires the returned values be zero. Previously, this memory was uninitialized, leading to potentially sensitive data disclosure. |
Affected by 8 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
VCID-62sh-rk29-duez | Under certain conditions, when handling a ReadableStream, a race condition can cause a use-after-free. We are aware of targeted attacks in the wild abusing this flaw. |
CVE-2020-6820
|
VCID-tnxu-vr8f-qqcu | Under certain conditions, when running the nsDocShell destructor, a race condition can cause a use-after-free. We are aware of targeted attacks in the wild abusing this flaw. |
CVE-2020-6819
|
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|---|---|---|---|---|
2025-07-31T11:35:07.872323+00:00 | Arch Linux Importer | Fixing | VCID-tnxu-vr8f-qqcu | https://security.archlinux.org/AVG-1125 | 37.0.0 |
2025-07-31T11:35:07.843489+00:00 | Arch Linux Importer | Fixing | VCID-62sh-rk29-duez | https://security.archlinux.org/AVG-1125 | 37.0.0 |
2025-07-31T11:35:07.808815+00:00 | Arch Linux Importer | Affected by | VCID-u4b2-jwjp-b3dn | https://security.archlinux.org/AVG-1127 | 37.0.0 |
2025-07-31T11:35:07.781750+00:00 | Arch Linux Importer | Affected by | VCID-44s1-9g8d-bbam | https://security.archlinux.org/AVG-1127 | 37.0.0 |
2025-07-31T11:35:07.755102+00:00 | Arch Linux Importer | Affected by | VCID-5dzc-dujk-97de | https://security.archlinux.org/AVG-1127 | 37.0.0 |
2025-07-31T11:35:07.728324+00:00 | Arch Linux Importer | Affected by | VCID-n6v5-na4s-j7ed | https://security.archlinux.org/AVG-1127 | 37.0.0 |
2025-07-31T11:35:07.697315+00:00 | Arch Linux Importer | Affected by | VCID-kj7s-t8f7-c7gq | https://security.archlinux.org/AVG-1127 | 37.0.0 |