Search for packages
purl | pkg:alpm/archlinux/firefox@84.0.2-1 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-28mx-ktwr-mubm
Aliases: CVE-2021-23955 |
The browser could have been confused into transferring a pointer lock state into another tab, which could have lead to clickjacking attacks. |
Affected by 0 other vulnerabilities. |
VCID-5db7-f394-tbee
Aliases: CVE-2021-23957 |
Navigations through the Android-specific `intent` URL scheme could have been misused to escape iframe sandbox.*Note: This issue only affected Firefox for Android. Other operating systems are unaffected.* |
Affected by 0 other vulnerabilities. |
VCID-9q27-mmmy-1qbu
Aliases: CVE-2021-23962 |
Incorrect use of the RowCountChanged method could have led to a user-after-poison and a potentially exploitable crash. |
Affected by 0 other vulnerabilities. |
VCID-bkrp-7kf2-b7er
Aliases: CVE-2021-23959 |
An XSS bug in internal error pages could have led to various spoofing attacks, including other error pages and the address bar.*Note: This issue only affected Firefox for Android. Other operating systems are unaffected.* |
Affected by 0 other vulnerabilities. |
VCID-ef6c-3aqn-qfhv
Aliases: CVE-2021-23953 |
If a user clicked into a specifically crafted PDF, the PDF reader could be confused into leaking cross-origin information, when said information is served as chunked data. |
Affected by 0 other vulnerabilities. |
VCID-fq54-3wa1-kkd4
Aliases: CVE-2021-23965 |
Mozilla developers Sebastian Hengst, Christian Holler, Tyson Smith reported memory safety bugs present in Firefox 84. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. |
Affected by 0 other vulnerabilities. |
VCID-ggf5-yptt-hkdb
Aliases: CVE-2021-23964 |
Mozilla developers Alexis Beingessner, Christian Holler, Andrew McCreight, Tyson Smith, Jon Coppeard, André Bargull, Jason Kratzer, Jesse Schwartzentruber, Steve Fink, Byron Campen reported memory safety bugs present in Firefox 84 and Firefox ESR 78.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. |
Affected by 0 other vulnerabilities. |
VCID-k5zh-csjt-pufp
Aliases: CVE-2021-23963 |
When sharing geolocation during an active WebRTC share, Firefox could have reset the webRTC sharing state in the user interface, leading to loss of control over the currently granted permission |
Affected by 0 other vulnerabilities. |
VCID-p6yd-8gh3-wqh8
Aliases: CVE-2021-23954 |
Using the new logical assignment operators in a JavaScript switch statement could have caused a type confusion, leading to a memory corruption and a potentially exploitable crash. |
Affected by 0 other vulnerabilities. |
VCID-q1r4-kzfc-1kf5
Aliases: CVE-2021-23958 |
The browser could have been confused into transferring a screen sharing state into another tab, which would leak unintended information. |
Affected by 0 other vulnerabilities. |
VCID-twxq-j2u9-gue2
Aliases: CVE-2021-23961 |
Further techniques that built on the slipstream research combined with a malicious webpage could have exposed both an internal network's hosts as well as services running on the user's local machine. |
Affected by 0 other vulnerabilities. |
VCID-wgmv-rr1v-5ub9
Aliases: CVE-2021-23956 |
An ambiguous file picker design could have confused users who intended to select and upload a single file into uploading a whole directory. This was addressed by adding a new prompt. |
Affected by 0 other vulnerabilities. |
VCID-zuh2-7wkb-d7f9
Aliases: CVE-2021-23960 |
Performing garbage collection on re-declared JavaScript variables resulted in a user-after-poison, and a potentially exploitable crash. |
Affected by 0 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
VCID-qncc-mm1j-u7aq | A malicious peer could have modified a COOKIE-ECHO chunk in a SCTP packet in a way that potentially resulted in a use-after-free. We presume that with enough effort it could have been exploited to run arbitrary code. |
CVE-2020-16044
|
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|---|---|---|---|---|
2025-07-31T11:38:06.290745+00:00 | Arch Linux Importer | Affected by | VCID-5db7-f394-tbee | https://security.archlinux.org/AVG-1493 | 37.0.0 |
2025-07-31T11:38:06.265890+00:00 | Arch Linux Importer | Affected by | VCID-bkrp-7kf2-b7er | https://security.archlinux.org/AVG-1493 | 37.0.0 |
2025-07-31T11:36:41.402090+00:00 | Arch Linux Importer | Affected by | VCID-ef6c-3aqn-qfhv | https://security.archlinux.org/AVG-1492 | 37.0.0 |
2025-07-31T11:36:41.372120+00:00 | Arch Linux Importer | Affected by | VCID-p6yd-8gh3-wqh8 | https://security.archlinux.org/AVG-1492 | 37.0.0 |
2025-07-31T11:36:41.344448+00:00 | Arch Linux Importer | Affected by | VCID-28mx-ktwr-mubm | https://security.archlinux.org/AVG-1492 | 37.0.0 |
2025-07-31T11:36:41.317267+00:00 | Arch Linux Importer | Affected by | VCID-wgmv-rr1v-5ub9 | https://security.archlinux.org/AVG-1492 | 37.0.0 |
2025-07-31T11:36:41.288289+00:00 | Arch Linux Importer | Affected by | VCID-q1r4-kzfc-1kf5 | https://security.archlinux.org/AVG-1492 | 37.0.0 |
2025-07-31T11:36:41.259408+00:00 | Arch Linux Importer | Affected by | VCID-zuh2-7wkb-d7f9 | https://security.archlinux.org/AVG-1492 | 37.0.0 |
2025-07-31T11:36:41.230749+00:00 | Arch Linux Importer | Affected by | VCID-twxq-j2u9-gue2 | https://security.archlinux.org/AVG-1492 | 37.0.0 |
2025-07-31T11:36:41.201711+00:00 | Arch Linux Importer | Affected by | VCID-9q27-mmmy-1qbu | https://security.archlinux.org/AVG-1492 | 37.0.0 |
2025-07-31T11:36:41.172357+00:00 | Arch Linux Importer | Affected by | VCID-k5zh-csjt-pufp | https://security.archlinux.org/AVG-1492 | 37.0.0 |
2025-07-31T11:36:41.143263+00:00 | Arch Linux Importer | Affected by | VCID-ggf5-yptt-hkdb | https://security.archlinux.org/AVG-1492 | 37.0.0 |
2025-07-31T11:36:41.115007+00:00 | Arch Linux Importer | Affected by | VCID-fq54-3wa1-kkd4 | https://security.archlinux.org/AVG-1492 | 37.0.0 |
2025-07-31T11:35:03.214429+00:00 | Arch Linux Importer | Fixing | VCID-qncc-mm1j-u7aq | https://security.archlinux.org/AVG-1413 | 37.0.0 |