firefox-debuginfo vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the firefox-debuginfo package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Improper Neutralization of Null Byte or NUL Character

<0:140.4.0-1.amzn2023.0.4
  • H
Integer Overflow or Wraparound

<0:128.10.0-1.amzn2023.0.2
  • H
Interpretation Conflict

<0:140.4.0-1.amzn2023.0.2
  • H
Exposure of System Data to an Unauthorized Control Sphere

<0:140.4.0-1.amzn2023.0.2
  • H
Out-of-Bounds

<0:140.4.0-1.amzn2023.0.2
  • H
Out-of-bounds Read

<0:140.4.0-1.amzn2023.0.2
  • H
Use After Free

<0:140.4.0-1.amzn2023.0.2
  • H
Improper Access Control

<0:140.4.0-1.amzn2023.0.2
  • H
Out-of-Bounds

<0:140.4.0-1.amzn2023.0.2
  • H
Out-of-bounds Read

<0:140.3.0-1.amzn2023.0.1
  • H
Use After Free

<0:140.3.0-1.amzn2023.0.1
  • H
CVE-2025-10529

<0:140.3.0-1.amzn2023.0.1
  • H
Allocation of Resources Without Limits or Throttling

<0:140.3.0-1.amzn2023.0.1
  • H
CVE-2025-10536

<0:140.3.0-1.amzn2023.0.1
  • H
Access of Uninitialized Pointer

<0:140.3.0-1.amzn2023.0.1
  • H
CVE-2025-10537

<0:140.3.0-1.amzn2023.0.1
  • H
Integer Overflow or Wraparound

<0:140.3.0-1.amzn2023.0.1
  • H
User Interface (UI) Misrepresentation of Critical Information

<0:140.2.0-1.amzn2023.0.1
  • H
Improper Input Validation

<0:140.2.0-1.amzn2023.0.1
  • H
Resource Exhaustion

<0:140.2.0-1.amzn2023.0.1
  • H
Out-of-Bounds

<0:140.2.0-1.amzn2023.0.1
  • H
Out-of-Bounds

<0:140.2.0-1.amzn2023.0.1
  • H
Improper Initialization

<0:140.2.0-1.amzn2023.0.1
  • H
Out-of-Bounds

<0:140.2.0-1.amzn2023.0.1
  • H
Information Exposure

<0:140.2.0-1.amzn2023.0.1
  • H
NULL Pointer Dereference

<0:140.1.0-1.amzn2023.0.2
  • H
Out-of-Bounds

<0:140.1.0-1.amzn2023.0.2
  • H
Insufficient Protection Against Instruction Skipping Via Fault Injection

<0:140.1.0-1.amzn2023.0.2
  • H
Incorrect Default Permissions

<0:140.1.0-1.amzn2023.0.2
  • H
Cross-site Scripting (XSS)

<0:140.1.0-1.amzn2023.0.2
  • H
Out-of-Bounds

<0:140.1.0-1.amzn2023.0.2
  • H
Protection Mechanism Failure

<0:140.1.0-1.amzn2023.0.2
  • H
Arbitrary Code Injection

<0:140.1.0-1.amzn2023.0.2
  • H
Use of Uninitialized Variable

<0:140.1.0-1.amzn2023.0.2
  • H
Information Exposure

<0:128.12.0-1.amzn2023.0.1
  • H
Use of Incorrectly-Resolved Name or Reference

<0:128.12.0-1.amzn2023.0.1
  • H
Use After Free

<0:128.12.0-1.amzn2023.0.1
  • H
Cross-site Scripting (XSS)

<0:128.12.0-1.amzn2023.0.1
  • H
Out-of-bounds Write

<0:128.11.0-1.amzn2023.0.2
  • H
Improper Encoding or Escaping of Output

<0:128.11.0-1.amzn2023.0.2
  • H
Improper Restriction of Rendered UI Layers or Frames

<0:128.11.0-1.amzn2023.0.2
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:128.11.0-1.amzn2023.0.2
  • H
Out-of-Bounds

<0:128.11.0-1.amzn2023.0.2
  • H
Out-of-Bounds

<0:128.11.0-1.amzn2023.0.2
  • H
Out-of-bounds Write

<0:128.11.0-1.amzn2023.0.2
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:128.11.0-1.amzn2023.0.2
  • H
Improper Encoding or Escaping of Output

<0:128.11.0-1.amzn2023.0.2
  • H
Integer Overflow or Wraparound

<0:128.10.0-1.amzn2023.0.2
  • H
Out-of-bounds Read

<0:128.10.0-1.amzn2023.0.2
  • H
Insufficient Compartmentalization

<0:128.10.0-1.amzn2023.0.2
  • H
Buffer Overflow

<0:128.10.0-1.amzn2023.0.2
  • H
Buffer Overflow

<0:128.10.0-1.amzn2023.0.2
  • H
Buffer Overflow

<0:128.9.0-1.amzn2023.0.1
  • H
Use After Free

<0:128.9.0-1.amzn2023.0.1
  • H
Origin Validation Error

<0:128.9.0-1.amzn2023.0.1