Search for packages
Package details: pkg:alpm/archlinux/firefox@74.0.1-1
purl pkg:alpm/archlinux/firefox@74.0.1-1
Next non-vulnerable version 76.0-1
Latest non-vulnerable version 101.0-1
Risk 4.5
Vulnerabilities affecting this package (5)
Vulnerability Summary Fixed by
VCID-44s1-9g8d-bbam
Aliases:
CVE-2020-6823
A malicious extension could have called browser.identity.launchWebAuthFlow, controlling the redirect_uri, and through the Promise returned, obtain the Auth code and gain access to the user's account at the service provider.
75.0-1
Affected by 8 other vulnerabilities.
VCID-5dzc-dujk-97de
Aliases:
CVE-2020-6824
Initially, a user opens a Private Browsing Window and generates a password for a site, then closes the Private Browsing Window but leaves Firefox open. Subsequently, if the user had opened a new Private Browsing Window, revisited the same site, and generated a new password - the generated passwords would have been identical, rather than independent.
75.0-1
Affected by 8 other vulnerabilities.
VCID-kj7s-t8f7-c7gq
Aliases:
CVE-2020-6826
Mozilla developers Tyson Smith, Bob Clary, and Alexandru Michis reported memory safety bugs present in Firefox 74. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
75.0-1
Affected by 8 other vulnerabilities.
VCID-n6v5-na4s-j7ed
Aliases:
CVE-2020-6825
Mozilla developers and community members Tyson Smith and Christian Holler reported memory safety bugs present in Firefox 74 and Firefox ESR 68.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
75.0-1
Affected by 8 other vulnerabilities.
VCID-u4b2-jwjp-b3dn
Aliases:
CVE-2020-6821
When reading from areas partially or fully outside the source resource with WebGL's copyTexSubImage method, the specification requires the returned values be zero. Previously, this memory was uninitialized, leading to potentially sensitive data disclosure.
75.0-1
Affected by 8 other vulnerabilities.
Vulnerabilities fixed by this package (2)
Vulnerability Summary Aliases
VCID-62sh-rk29-duez Under certain conditions, when handling a ReadableStream, a race condition can cause a use-after-free. We are aware of targeted attacks in the wild abusing this flaw. CVE-2020-6820
VCID-tnxu-vr8f-qqcu Under certain conditions, when running the nsDocShell destructor, a race condition can cause a use-after-free. We are aware of targeted attacks in the wild abusing this flaw. CVE-2020-6819

Date Actor Action Vulnerability Source VulnerableCode Version
2025-07-31T11:35:07.872323+00:00 Arch Linux Importer Fixing VCID-tnxu-vr8f-qqcu https://security.archlinux.org/AVG-1125 37.0.0
2025-07-31T11:35:07.843489+00:00 Arch Linux Importer Fixing VCID-62sh-rk29-duez https://security.archlinux.org/AVG-1125 37.0.0
2025-07-31T11:35:07.808815+00:00 Arch Linux Importer Affected by VCID-u4b2-jwjp-b3dn https://security.archlinux.org/AVG-1127 37.0.0
2025-07-31T11:35:07.781750+00:00 Arch Linux Importer Affected by VCID-44s1-9g8d-bbam https://security.archlinux.org/AVG-1127 37.0.0
2025-07-31T11:35:07.755102+00:00 Arch Linux Importer Affected by VCID-5dzc-dujk-97de https://security.archlinux.org/AVG-1127 37.0.0
2025-07-31T11:35:07.728324+00:00 Arch Linux Importer Affected by VCID-n6v5-na4s-j7ed https://security.archlinux.org/AVG-1127 37.0.0
2025-07-31T11:35:07.697315+00:00 Arch Linux Importer Affected by VCID-kj7s-t8f7-c7gq https://security.archlinux.org/AVG-1127 37.0.0