mozilla vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the https://ftp.mozilla.org|mozilla package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Use After Free

[0,)
  • M
Cross-site Scripting (XSS)

[,3.1.5][3.1.5,3.6.24)
  • L
Cross-site Scripting (XSS)

[,1.5.0.7)
  • C
Out-of-Bounds

[,43.0)
  • M
Access Restriction Bypass

[,1.5.0.4)
  • C
Out-of-Bounds

[,8.0)
  • M
Information Exposure

[,2.0.0.17)
  • M
Improper Verification of Cryptographic Signature

[,78.9.1)
  • H
Out-of-Bounds

[,16.0)
  • H
Improper Input Validation

[,3.0.10][3.0.10,3.5.16)
  • H
Out-of-Bounds

[,60.0)
  • M
Improper Input Validation

[,31.2][31.2,33.0.1)
  • M
Information Exposure

[,52.9.0)
  • C
Out-of-Bounds

[,60.6.0)(60.6.0,66.0)
  • M
Information Exposure

[,88.0)
  • H
Out-of-Bounds

[,65.0)
  • M
Authentication Bypass

[0,)
  • C
Use After Free

[,52.2.0)(52.2.0,54.0)
  • C
Improper Input Validation

[,68.8.0)(68.8.0,76.0)
  • M
Cross-site Scripting (XSS)

[,3.0.6][3.0.6,3.5.12)
  • M
CVE-2021-29983

[,91.0)
  • M
Access Restriction Bypass

[,3.0.6)
  • C
Denial of Service (DoS)

[3.5.1,3.5.3]
  • C
Denial of Service (DoS)

[,30.0)
  • M
Improper Certificate Validation

[,17.0.3)(17.0.3,19.0)
  • M
Cross-site Scripting (XSS)

[4.0,12.0]
  • C
Denial of Service (DoS)

[,17.0.6][17.0.6,22.0)
  • M
Information Exposure

[,52.2.0)(52.2.0,54.0)
  • C
Out-of-Bounds

[,51.0)
  • M
Information Exposure

[,58)
  • C
Arbitrary Code Execution

[,38.0.1][38.0.1,38.1)
  • L
Access Restriction Bypass

[0.8,1.0]
  • L
Access Restriction Bypass

[,3.6.22][3.6.22,7.0)
  • M
Improper Input Validation

[,3.0.14)
  • H
Denial of Service (DoS)

[preview_release,1.5.0.1]
  • M
Unsafe Dependency Resolution

[,60.9.0)[68.0,68.1.0)(68.1.0,69.0)
  • H
Integer Overflow or Wraparound

[10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0)
  • M
Access Restriction Bypass

[,17.0)
  • M
Cross-site Scripting (XSS)

[4.0,11.0]
  • C
Out-of-Bounds

[,14.0.1)
  • C
Out-of-Bounds

[,45.7.0)(45.7.0,51.0.1)
  • H
CVE-2005-2260

[0.8,1.0.4]
  • H
Use After Free

[10.0,10.0.11)(10.0.11,17.0)
  • M
Cross-site Scripting (XSS)

[,17.0.7][17.0.7,23.0)
  • H
Improper Authentication

[2.0,2.0.0.18)[3.0,3.0.4)
  • C
Denial of Service (DoS)

[,2.0.0.17)[3.0,3.0.2)
  • H
Out-of-Bounds

[,32.0.1)
  • H
Type Confusion

[,68.4.1)(68.4.1,72.0.1)
  • C
Out-of-Bounds

[,50.0)
  • C
Out-of-bounds Read

[10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0)
  • M
Arbitrary Code Execution

[0.8,1.0]
  • M
Cross-site Scripting (XSS)

[4.0,9.0]
  • M
Out-of-Bounds

[,87.0)
  • H
Denial of Service (DoS)

[,3.0.6][3.0.6,3.5.12)
  • M
Information Exposure

[,3.5.19)
  • C
Use After Free

[,31.1)
  • H
Resource Management Errors

[,3.0.6][3.0.6,3.5.12)
  • H
Use After Free

[10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0)
  • C
Denial of Service (DoS)

[,17.0.5][17.0.5,21.0)
  • H
Improper Access Control

[,49.0)
  • M
CVE-2005-0588

[0.8,1.0]
  • M
Arbitrary Code Injection

[,68.0)
  • H
Cross-site Request Forgery (CSRF)

[,61.0)
  • C
Denial of Service (DoS)

[,3.0.12)
  • C
Out-of-Bounds

[,50.1)
  • M
Improper Input Validation

[,43.0)
  • M
Improper Input Validation

[,60.0)
  • M
Authentication Bypass

[,68.0)
  • C
Use After Free

[10.0,10.0.7)(10.0.7,15.0)
  • H
Out-of-bounds Read

[,78.11)(78.11,89.0)
  • C
Resource Management Errors

[,2.0.0.20)
  • H
Resource Management Errors

[,3.5.5]
  • H
Unsafe Dependency Resolution

[,71.0)
  • C
Out-of-Bounds

[,68.8.0)(68.8.0,76.0)
  • M
Cross-site Scripting (XSS)

[,60.0)
  • H
Denial of Service (DoS)

[1.5,1.5.0.4]
  • M
Cross-site Scripting (XSS)

[,1.5.0.4)
  • C
Remote Code Execution (RCE)

[24.0,24.2)(24.2,26.0)
  • M
Access Restriction Bypass

[,37.0)
  • M
Resource Management Errors

[2.0,2.0.0.19)[3.0,3.0.5)
  • M
Access Restriction Bypass

[,60.3)(60.3,63.0)
  • H
Out-of-Bounds

[,40.0)
  • C
Out-of-bounds Write

[,27.0)
  • H
Use After Free

[10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0)
  • H
Denial of Service (DoS)

[,56.0)
  • H
Use After Free

[,60.9.0)[68.0,68.1.0)(68.1.0,69.0)
  • M
Use of Uninitialized Resource

[,68.5.0)
  • M
Out-of-Bounds

[,43.0)
  • M
Access Restriction Bypass

[,31.5][31.5,31.5.3][31.5.3,37.0)
  • M
Race Condition

[,45.0)
  • M
Cross-site Scripting (XSS)

[,2.0]
  • H
Information Exposure

[,85.0)
  • M
Cross-site Scripting (XSS)

[4.0,4.0.1]
  • C
Denial of Service (DoS)

[,24.0][24.0,24.1)
  • M
Information Exposure

[,72.0)
  • M
Arbitrary Code Execution

[,1.5.0.9]
  • L
CVE-2005-0145

[0.8,1.0]
  • M
Out-of-Bounds

[,24.0][24.0,24.1)
  • H
Arbitrary Code Execution

[,43.0)
  • C
Deserialization of Untrusted Data

[,76.0)
  • M
Access Restriction Bypass

[,2.0.0.5)
  • H
Out-of-Bounds

[,42.0)
  • M
Cross-site Scripting (XSS)

[,2.0.0.12)
  • H
Out-of-bounds Write

[10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0)
  • M
Use After Free

[,68.9.0)(68.9.0,77.0)
  • M
Arbitrary Code Execution

[,1.0]
  • C
Denial of Service (DoS)

[2.0,2.0.0.18)[3.0,3.0.4)
  • H
CVE-2006-1727

[1.0,1.0.8)[1.5,1.5.0.2)
  • H
Out-of-Bounds

[,24.0)
  • M
Improper Input Validation

[4.0,13.0]
  • H
Remote Code Execution (RCE)

[,3.0]
  • M
Security Features

[,42.0)
  • M
Security Features

[,41.0)
  • M
Access Restriction Bypass

[,3.1.10][3.1.10,3.6.18)
  • M
Information Exposure

[,78.8)(78.8,86.0)
  • C
Out-of-Bounds

[,52.8.0)(52.8.0,60.0)
  • H
Denial of Service (DoS)

[,25.0.1)
  • C
Use After Free

[,49.0.2)
  • M
Out-of-Bounds

[,17.0.9][17.0.9,24.0)
  • M
Denial of Service (DoS)

[,2.0.0.19)
  • C
Integer Overflow or Wraparound

[,52.0.1)
  • H
Arbitrary Code Execution

[,78.9.1)
  • H
Denial of Service (DoS)

[,3.0.6][3.0.6,3.5.12)
  • C
Denial of Service (DoS)

[,3.6.22][3.6.22,7.0)
  • H
CVE-2013-0797

[,20.0)
  • C
Denial of Service (DoS)

[,20.0)
  • M
Out-of-bounds Read

[,49.0)
  • M
Cryptographic Issues

[,32.0.1)
  • M
Access Restriction Bypass

[,74.0)
  • H
Integer Overflow or Wraparound

[,47.0.2)
  • C
Denial of Service (DoS)

[4.0,8.0]
  • C
Out-of-Bounds

[,56.0)
  • M
Out-of-Bounds

[,3.1.10][3.1.10,3.6.18)
  • H
Out-of-Bounds

[,41.0)
  • M
NULL Pointer Dereference

[,68.5.0)
  • M
Resource Management Errors

[3.0.19,3.6]
  • H
Use of Uninitialized Resource

[,60.0)
  • C
Use After Free

[,17.0)
  • H
Improper Input Validation

[,3.1.5][3.1.5,3.6.24)
  • H
Improper Input Validation

[,17.0.6][17.0.6,22.0)
  • H
Arbitrary Code Execution

[,14.0.1)
  • M
Security Features

[,45.8.0)(45.8.0,52.0)
  • C
Resource Management Errors

[,3.6.7]
  • C
Resource Management Errors

[,3.5.19)
  • C
Arbitrary Code Execution

[0.6,0.9.3]
  • H
Release of Invalid Pointer or Reference

[,78.3)(78.3,81.0)
  • L
CVE-2008-5503

[,2.0.0.19)
  • H
Out-of-Bounds

[,58)
  • M
Cross-site Scripting (XSS)

[,69.0)
  • M
Improper Input Validation

[,3.5.2)
  • M
Cross-site Scripting (XSS)

[,88.0)
  • C
Resource Management Errors

[,31.6][31.6,37.0.2][37.0.2,38.0.1)
  • C
Resource Management Errors

[2.0,2.0.0.18)[3.0,3.0.4)
  • M
Denial of Service (DoS)

[,45.0)
  • C
Out-of-Bounds

[,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0)
  • M
Information Exposure

[,41.0)
  • H
Buffer Overflow

[,68.3)(68.3,71.0)
  • M
Improper Input Validation

[3.0,3.0.1]
  • H
Argument Injection

[,68.1.0)(68.1.0,69.0)
  • C
Denial of Service (DoS)

[,3.0.12)
  • H
CVE-2012-4206

[,17.0)
  • H
Denial of Service (DoS)

[,31.5][31.5,31.5.3][31.5.3,37.0)
  • C
Out-of-Bounds

[,64.0)
  • M
Cross-site Scripting (XSS)

[10.0,10.0.11)(10.0.11,17.0)
  • H
Denial of Service (DoS)

[,3.0.5)
  • M
Access Restriction Bypass

[4.0,4.0.1]
  • H
Use After Free

[,51.0)
  • M
Security Features

[,36.0)
  • M
Incorrect Calculation

[,78.10)(78.10,88.0)
  • C
Improper Input Validation

[,60.6.0)(60.6.0,66.0)
  • C
Resource Management Errors

[,3.0.12)
  • M
Improper Cross-boundary Removal of Sensitive Data

[,78.5)(78.5,83.0)
  • H
Improper Handling of Exceptional Conditions

[,60.7.0)(60.7.0,67.0)
  • H
Out-of-Bounds

[,20.0)
  • M
Information Exposure

[,8.0)
  • H
Resource Management Errors

[,3.0.8)
  • M
Access Restriction Bypass

[4.0,10.2]
  • H
Out-of-bounds Read

[,29.0)
  • M
Improper Input Validation

[,47.0.2)
  • M
Information Exposure

[,52.7.0)(52.7.0,59.0)
  • M
Cross-site Scripting (XSS)

[,52.1.0)(52.1.0,53.0)
  • M
Information Exposure

[,61.0)
  • H
Access Restriction Bypass

[,36.0.4)
  • M
Insufficiently Protected Credentials

[,68.5.0)
  • H
Out-of-Bounds

[4.0,13.0]
  • H
Denial of Service (DoS)

[,1.5.0.2)
  • M
Resource Management Errors

[,1.5.0.2]
  • H
Out-of-Bounds

[,47.0)
  • H
Out-of-bounds Write

[,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0)
  • H
Resource Management Errors

[,3.0.3][3.0.3,3.0.18)
  • M
Memory Leak

[,91.0)
  • M
Security Features

[,52.6.0)(52.6.0,58.0)
  • M
Cross-site Scripting (XSS)

[1.5,1.5.0.4]
  • M
Arbitrary Code Execution

[0.8,0.9.3]
  • H
Denial of Service (DoS)

[,17.0.3)(17.0.3,19.0)
  • C
Use After Free

[,52.2.0)(52.2.0,54.0)
  • H
Out-of-bounds Write

[,90.0)
  • M
Directory Traversal

[,28.0)
  • H
Incorrect Authorization

[,60.3)(60.3,63.0)
  • H
Resource Management Errors

[2.0,2.0.0.18)[3.0,3.0.4)
  • H
Improper Input Validation

[,52.7.0)(52.7.0,59.0)
  • H
Denial of Service (DoS)

[0.8,2.0.0.9]
  • M
Resource Management Errors

[,2.0.0.13)
  • H
Use After Free

[,78.0)
  • H
Arbitrary Code Injection

[,68.6.0)(68.6.0,74.0)
  • M
Information Exposure

[,59.0)
  • H
CVE-2015-0833

[,31.4][31.4,36.0)
  • L
CVE-2005-2602

[1.0,1.0.6]
  • H
Improper Input Validation

[0,)
  • M
Information Exposure

[,47.0.2)
  • L
CVE-2006-2786

[,1.5.0.4)
  • M
Arbitrary Code Injection

[,52.5.2)
  • M
Information Exposure

[4.0,9.0]
  • H
Resource Management Errors

[,17.0.6][17.0.6,22.0)
  • M
Access Restriction Bypass

[,14.0.1)
  • C
Denial of Service (DoS)

[,40.0)
  • H
Improper Input Validation

[,60.2.1)(60.2.1,62.0.2)
  • H
Denial of Service (DoS)

[3.6,3.7]
  • C
Arbitrary Code Execution

[,24.0][24.0,24.1)
  • C
Arbitrary Code Execution

[,38.1)
  • H
Information Exposure

[,58)
  • C
Use After Free

[,52.2.0)(52.2.0,54.0)
  • H
Access Restriction Bypass

[,31.5][31.5,31.5.3][31.5.3,37.0)
  • M
CVE-2004-0909

[0.1,0.7.2]
  • H
Type Confusion

[,78.1)(78.1,79.0)
  • M
User Impersonation

[,74.0)
  • H
Denial of Service (DoS)

[,29.0)
  • H
Buffer Overflow

[,81.0)
  • C
Use After Free

[,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0)
  • C
Denial of Service (DoS)

[24.0,24.3)(24.3,27.0)
  • H
Denial of Service (DoS)

[3.0,3.6.6]
  • C
Out-of-bounds Read

[,52.2.0)(52.2.0,54.0)
  • C
Use After Free

[24.0,24.4)(24.4,28.0)
  • H
Out-of-Bounds

[,68.7.0)
  • M
Out-of-Bounds

[,36.0)
  • H
CVE-2012-1943

[,12.0]
  • M
Information Exposure

[,47.0.2)
  • H
Arbitrary Code Execution

[,38.6.0][38.6.0,45.0)
  • C
Use After Free

[10.0,10.0.7)(10.0.7,15.0)
  • M
Cross-site Scripting (XSS)

[,68.4)(68.4,72.0)
  • H
Out-of-Bounds

[,45.0)
  • M
Information Exposure

[1.5,1.5.0.10)[2.0,2.0.0.2)
  • M
Cross-site Scripting (XSS)

[,14.0.1)
  • H
Use After Free

[,68.6.0)(68.6.0,74.0)
  • M
Improper Input Validation

[,47.0.2)
  • M
Denial of Service (DoS)

[0.1,1.0]
  • H
Access Restriction Bypass

[,14.0.1)
  • H
Improper Input Validation

[,17.0.2)(17.0.2,18.0)
  • H
Denial of Service (DoS)

[,45.0)
  • M
Improper Input Validation

[,3.0.11)
  • M
Out-of-Bounds

[,60.6)(60.6,66.0)
  • H
Remote Code Execution (RCE)

[,68.3)(68.3,71.0)
  • M
Resource Management Errors

[,3.0.2)
  • M
Information Exposure

[,52.9.0)
  • H
Resource Management Errors

[,51.0)
  • M
Access Restriction Bypass

[,31.0)
  • C
Use After Free

[24.0,24.2)(24.2,26.0)
  • C
Out-of-Bounds

[,60.4.0)(60.4.0,64.0)
  • M
Improper Input Validation

[,3.5.17)
  • H
Out-of-Bounds

[,41.0)
  • M
Code

[,38.0)
  • M
Information Exposure

[,26.0)
  • C
CVE-2009-2471

[,3.0.12)
  • H
Remote Code Execution (RCE)

[,3.6.22][3.6.22,6.0][6.0,7.0)
  • C
Use After Free

[,52.8.0)(52.8.0,60.0)
  • M
Denial of Service (DoS)

[0.8,1.0.4]
  • C
Out-of-Bounds

[,17.0.9][17.0.9,24.0)
  • H
Out-of-Bounds

[,42.0)
  • H
Buffer Overflow

[0,)
  • C
Privilege Escalation

[,75.0)
  • H
Missing Initialization of Resource

[,78.13.0)(78.13.0,91.0)
  • M
Improper Input Validation

[,31.2][31.2,33.0.1)
  • H
Arbitrary Code Execution

[0.1,1.5.0.3]
  • M
Insecure Default

[,78.0)
  • C
Resource Management Errors

[,1.0.7]
  • M
Access Restriction Bypass

[1.0,3.1.19][3.1.19,3.6.28)(4.0,5.0)(5.0,10.0.1)
  • M
Out-of-Bounds

[,38.6.0][38.6.0,45.0)
  • C
Out-of-bounds Write

[,26.0)
  • M
Cross-site Scripting (XSS)

[,3.0.9)
  • M
Cross-site Scripting (XSS)

[,24.0)
  • H
Use After Free

[,90.0)
  • C
Out-of-Bounds

[,17.0.9][17.0.9,24.0)
  • H
Out-of-Bounds

[4.0,11.0]
  • M
Remote Code Execution (RCE)

[,2.0.0.13)
  • C
Resource Management Errors

[2.0,2.0.0.19)[3.0,3.0.5)
  • H
Out-of-Bounds

[,52.5.2)(52.5.2,57.0.2)
  • H
Out-of-Bounds

[,47.0.2)
  • M
Information Exposure

[,80.0)
  • H
Privilege Escalation

[,16.0)
  • C
Buffer Overflow

[,68.1.0)(68.1.0,69.0)
  • H
Improper Input Validation

[,1.0.8)
  • H
Access Restriction Bypass

[,60.0)
  • H
Out-of-bounds Write

[24.0,24.3)(24.3,27.0)
  • C
Denial of Service (DoS)

[,3.0.14)
  • C
Out-of-Bounds

[,60.9.0)[68.0,68.1.0)(68.1.0,69.0)
  • H
Resource Management Errors

[4.0,12.0]
  • H
Out-of-Bounds

[,41.0)
  • H
Out-of-Bounds

[,52.0)
  • H
Denial of Service (DoS)

[3.6,3.6.3]
  • M
Cross-site Scripting (XSS)

[,40.0)
  • H
Resource Management Errors

[1.0,1.0.8)(1.0.8,1.5.0.1)
  • H
Out-of-Bounds

[,60.8.0)(60.8.0,68.0)
  • M
Resources Downloaded over Insecure Protocol

[,60.9.0)[68.0,68.1.0)
  • H
Denial of Service (DoS)

[,2.0.0.22)
  • M
Denial of Service (DoS)

[,36.0)
  • M
Access Restriction Bypass

[,3.1.16][3.1.16,3.6.25)
  • L
Information Exposure

[,51.0)
  • H
Access Restriction Bypass

[,22.0)
  • M
Race Condition

[,40.0)
  • M
Remote Code Execution (RCE)

[1.5,1.5.0.10)[2.0,2.0.0.2)
  • C
Use After Free

[,52.8.0)(52.8.0,60.0)
  • H
Out-of-bounds Write

[,60.2.0)(60.2.0,60.2.1)(60.2.1,62.0)
  • C
Denial of Service (DoS)

[3.6,3.6.22]
  • C
Out-of-Bounds

[,16.0)
  • M
Improper Access Control

[,63.0)
  • M
Security Features

[,42.0)
  • H
Resource Management Errors

[3.5,3.5.9]
  • C
Out-of-Bounds

[,52.3.0)(52.3.0,55.0)
  • L
Information Exposure

[,29.0)
  • H
Resource Management Errors

[,3.5.16)
  • H
Code

[,38.0.1][38.0.1,38.1)
  • C
Use After Free

[24.0,24.2)(24.2,26.0)
  • H
Out-of-bounds Write

[,17.0.2)(17.0.2,18.0)
  • H
Denial of Service (DoS)

[,1.0.7)
  • C
Out-of-Bounds

[,5.0.1)
  • M
Improper Access Control

[,47.0)
  • H
Access Restriction Bypass

[,19.0)
  • M
Access Restriction Bypass

[,29.0)
  • M
User Enumeration

[,68.9.0)(68.9.0,77.0)
  • C
Denial of Service (DoS)

[,21.0)
  • H
Resource Management Errors

[1.0,3.1.19][3.1.19,3.6.28)[4.0,5.0)(5.0,10.0.1)
  • M
Arbitrary Code Execution

[0.1,0.7.2]
  • M
Denial of Service (DoS)

[0,1.0.6-0.6.2.fc6)
  • C
Denial of Service (DoS)

[,3.1.7][3.1.7,3.5.17)
  • C
Out-of-bounds Read

[,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0)
  • H
Use After Free

[,78.4.1)(78.4.1,78.4.2)(78.4.2,82.0.3)
  • C
Out-of-bounds Read

[,65.0)
  • C
Resource Management Errors

[4.0,13.0]
  • C
Arbitrary Code Execution

[,45.0)
  • M
Authentication Bypass

[,3.0.16)
  • M
CVE-2006-1942

[,1.5.0.2]
  • M
Cross-site Scripting (XSS)

[,26.0)
  • M
Remote Code Execution (RCE)

[3.1,3.6.6]
  • M
Information Exposure

[,77.0)
  • C
Use After Free

[,58)
  • M
Cross-site Scripting (XSS)

[10.0,10.0.11)(10.0.11,17.0)
  • C
Use After Free

[,49.0)
  • H
Resource Management Errors

[,2.0.0.12)
  • C
Out-of-Bounds

[,52.1.0)(52.1.0,53.0)
  • H
Denial of Service (DoS)

[,31.3.0][31.3.0,35.0)
  • H
Out-of-Bounds

[,47.0)
  • M
Information Exposure

[,40.0)
  • H
Out-of-Bounds

[,45.1.0)
  • M
Information Exposure

[4.0,13.0]
  • M
Out-of-Bounds

[,24.0][24.0,24.1)
  • M
Security Features

[,56.0)
  • M
Access Restriction Bypass

[,52.8.0)(52.8.0,60.0)
  • M
User Impersonation

[,87.0)
  • M
Out-of-Bounds

[,36.0)
  • H
Out-of-Bounds

[3.1,3.6.12]
  • M
Improper Input Validation

[,51.0)
  • C
Denial of Service (DoS)

[,24.7][24.7,31.0)
  • H
Out-of-Bounds

[,85.0)
  • M
Improper Input Validation

[,21.0)
  • H
Out-of-Bounds

[,2.1.0][2.1.0,40.0)
  • M
Arbitrary Code Execution

[,1.5.0.4)
  • M
Authentication Bypass

[,28.0)
  • H
Out-of-Bounds

[,41.0)
  • H
Release of Invalid Pointer or Reference

[,81.0)
  • H
Use After Free

[,58)
  • L
Authentication Bypass

[0.8,1.0]
  • C
Use After Free

[,49.0)
  • H
Information Exposure

[,52.5.2)(52.5.2,57.0.1)
  • C
Use After Free

[10.0,10.0.7)(10.0.7,15.0)
  • H
Remote Code Execution (RCE)

[,3.0.18)
  • M
Improper Input Validation

[,72.0)
  • M
User Impersonation

[,68.11)[78.0,78.1)(78.1,79.0)
  • M
Improper Verification of Cryptographic Signature

[,28.0)
  • M
CVE-2020-12412

[,70.0)
  • H
Denial of Service (DoS)

[10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0)
  • M
Information Exposure

[,63.0)
  • M
Cross-site Scripting (XSS)

[0,)
  • M
Cross-site Scripting (XSS)

[,67.0)
  • M
CVE-2005-4685

[preview_release,1.5]
  • H
Access Restriction Bypass

[0,)
  • M
Denial of Service (DoS)

[,43.0)
  • H
Access Restriction Bypass

[24.0,24.3)(24.3,27.0)
  • C
Arbitrary Code Execution

[4.0,13.0]
  • C
Out-of-Bounds

[52.0,52.1.0)(52.1.0,52.3)(52.3,55.0)
  • H
Out-of-bounds Write

[,78.5.1)
  • H
Security Features

[,42.0)
  • M
Cross-site Scripting (XSS)

[,3.5.16)
  • H
Use After Free

[,47.0.2)
  • M
CVE-2018-12403

[,63.0)
  • L
Information Exposure

[,50.0)
  • C
Out-of-Bounds

[24.0,24.4)(24.4,28.0)
  • H
Denial of Service (DoS)

[3.0.1,3.6.6]
  • M
User Impersonation

[,60.4.0)(60.4.0,64.0)
  • M
Arbitrary Code Execution

[,2.0.0.12)
  • M
Cryptographic Issues

[3.5.10,4.0]
  • H
Insufficient Verification of Data Authenticity

[,68.9.0)(68.9.0,77.0)
  • C
Use After Free

[,52.2.0)(52.2.0,54.0)
  • M
Improper Input Validation

[,52.5.2)
  • C
Denial of Service (DoS)

[,3.1.10][3.1.10,3.6.18)
  • C
Out-of-Bounds

[,45.8.0)(45.8.0,52.0)
  • M
Information Exposure

[0.8,1.0.4]
  • H
Out-of-Bounds

[,38.0)
  • C
Access Restriction Bypass

[,20.0)
  • M
Improper Access Control

[,45.1.0)
  • M
Access Restriction Bypass

[,47.0.2)
  • H
Use After Free

[,10.0.8)(10.0.8,16.0)
  • M
Cross-site Scripting (XSS)

[2.0,2.0.0.19)[3.0,3.0.5)
  • M
Improper Preservation of Permissions

[,85.0)
  • H
Out-of-bounds Write

[,78.0)
  • C
Out-of-Bounds

[,3.5.17)
  • C
Use After Free

[,52.6.0)(52.6.0,58.0)
  • H
Directory Traversal

[,2.0.0.17)[3.0,3.0.2)
  • M
CVE-2009-0253

[,3.0.5]
  • M
CVE-2009-3370

[3.0,3.5.3]
  • H
Remote Code Execution (RCE)

[,1.0.6]
  • H
Cross-site Request Forgery (CSRF)

[,60.8.0)(60.8.0,68.0)
  • M
Authentication Bypass

[0,firefox-1.5.0.12-4.fc6)
  • M
Access Restriction Bypass

[,3.1.16][3.1.16,3.6.25)
  • H
Out-of-bounds Write

[,68.2)(68.2,70.0)
  • M
Improper Restriction of Rendered UI Layers or Frames

[,25.0)
  • C
Use After Free

[,49.0)
  • C
Out-of-Bounds

[,60.5)(60.5,65.0)
  • M
Information Exposure

[,2.0.0.18)
  • H
Out-of-bounds Write

[,10.0.11)(10.0.11,17.0)
  • M
Access Restriction Bypass

[,45.1.0)
  • M
Denial of Service (DoS)

[,78.9.1)
  • H
Integer Overflow or Wraparound

[,26.0)
  • M
Improper Input Validation

[,52.4.0)(52.4.0,56.0)
  • H
Remote Code Execution (RCE)

[1.5,1.5.0.9)[2.0,2.0.0.1)
  • M
Cross-site Scripting (XSS)

[,42.0)
  • M
Cryptographic Issues

[,43.0.4]
  • M
Remote Code Execution (RCE)

[,2.0.0.5)
  • M
Out-of-Bounds

[,17.0.9][17.0.9,24.0)
  • H
Use After Free

[24.0,24.5)(24.5,29.0)
  • H
CVE-2021-23960

[,78.7)(78.7,85.0)
  • H
Denial of Service (DoS)

[,3.0.2)
  • H
Out-of-bounds Write

[10.0,10.0.7)(10.0.7,15.0)
  • C
Out-of-Bounds

[,67.0)
  • H
Information Exposure

[,54.0)
  • H
Use After Free

[,17.0.3)(17.0.3,19.0)
  • H
Out-of-Bounds

[,60.6.1)(60.6.1,66.0.1)
  • H
Out-of-Bounds

[,45.1.0)
  • H
Resource Management Errors

[4.0,13.0]
  • H
Out-of-Bounds

[,52.9)[53.0,60.1)(60.1,61.0)
  • H
Information Exposure

[,60.0)
  • M
Improper Input Validation

[,3.0.3][3.0.3,3.5.8)
  • H
Out-of-Bounds

[,62.0)
  • C
Out-of-Bounds

[10.0,10.0.7)(10.0.7,15.0)
  • M
Arbitrary Code Execution

[1.5,1.5.0.4]
  • M
User Impersonation

[10.0,10.0.9)(10.0.9,16.0.1)
  • C
Out-of-Bounds

[,5.0.1)
  • H
Access Restriction Bypass

[,3.0.11)
  • M
Denial of Service (DoS)

[1.5,1.5.0.4]
  • M
Cross-site Scripting (XSS)

[10.0,10.0.11)(10.0.11,17.0)
  • H
Use After Free

[,50.0)
  • M
Improper Input Validation

[,45.5.0)(45.5.0,50.0)
  • H
Access Restriction Bypass

[,47.0.2)
  • M
Improper Input Validation

[,52.0)
  • H
Security Features

[,52.8.0)(52.8.0,60.0)
  • H
Improper Validation of Array Index

[,45.9.0)(45.9.0,52.1.0)(52.1.0,53.0)
  • H
Code

[,42.0)
  • M
Arbitrary Code Execution

[,31.2][31.2,33.0.1)
  • L
User Enumeration

[,60.9.0)[68.0,68.1.0)(68.1.0,69.0)
  • M
Insecure Encryption

[,17.0.11)[24.1.0,24.1.1)(24.1.1,25.0.1)
  • C
Improper Access Control

[,53.0)
  • H
Out-of-Bounds

[,78.13.0)(78.13.0,91.0)
  • H
Information Exposure

[,0.8]
  • M
Improper Input Validation

[,38.0]
  • M
Denial of Service (DoS)

[1.0,1.5]
  • H
Denial of Service (DoS)

[3.5.1,3.5.5]
  • H
Type Confusion

[,68.4)(68.4,72.0)
  • H
Use After Free

[,17.0.3)(17.0.3,19.0)
  • H
Arbitrary Code Execution

[0.8,1.0.4]
  • H
Improper Input Validation

[1.0,3.1.19][3.1.19,3.6.28)(4.0,5.0)(5.0,10.0.1)
  • M
Information Exposure

[,45.8.0)(45.8.0,52.0)
  • M
Cross-site Request Forgery (CSRF)

[,31.3.0][31.3.0,35.0)
  • H
Information Exposure

[1.5,1.5.0.4]
  • H
User Impersonation

[,55.0)
  • M
Cross-site Scripting (XSS)

[1.5,1.5.0.10)[2.0,2.0.0.2)
  • M
Cross-site Scripting (XSS)

[,3.0.9)
  • H
Access Restriction Bypass

[,2.0.0.19)
  • C
Use After Free

[10.0,10.0.7)(10.0.7,15.0)
  • M
Access Restriction Bypass

[,17.0.5][17.0.5,21.0)
  • H
Arbitrary Code Execution

[,78.0)
  • L
Authentication Bypass

[0.8,1.0]
  • H
Remote Code Execution (RCE)

[,52.8.0)(52.8.0,60.0)
  • H
Untrusted Search Path

[,52.2.0)(52.2.0,54.0)
  • C
Out-of-Bounds

[,60.7.1)
  • M
Open Redirect

[,86.0)
  • M
Access Restriction Bypass

[0.6,0.9]
  • L
Resource Management Errors

[3.0,3.0.5]
  • M
Improper Input Validation

[,53.0)
  • M
Improper Input Validation

[,55.0)
  • H
CVE-2019-11711

[,60.8.0)(60.8.0,68.0)
  • M
Cross-site Scripting (XSS)

[,3.0.2)
  • C
Out-of-Bounds

[,60.7.0)(60.7.0,67.0)
  • C
Out-of-Bounds

[2.0,3.0]
  • H
Resource Management Errors

[,2.0.0.12)
  • H
Access Restriction Bypass

[,3.5.19)
  • C
Use After Free

[24.0,24.2)(24.2,26.0)
  • C
Use After Free

[,52.4.0)(52.4.0,56.0)
  • H
Denial of Service (DoS)

[1.0,1.5]
  • H
Incorrect Type Conversion or Cast

[,47.0.2)
  • L
Cross-site Scripting (XSS)

[3.0,3.0.5]
  • M
Information Exposure

[,45.1.0)
  • C
Out-of-Bounds

[,51.0)
  • M
Cross-site Scripting (XSS)

[1.0,1.0.7]
  • C
Resource Management Errors

[,17.0.5][17.0.5,21.0)
  • M
Resource Management Errors

[,3.1)
  • M
Cross-site Scripting (XSS)

[,2.0]
  • M
Denial of Service (DoS)

[,1.5.0.1)
  • M
Out-of-Bounds

[,41.0)
  • M
CVE-2021-29974

[,90.0)
  • M
Security Features

[,47.0)
  • C
Use of Uninitialized Resource

[,66.0)
  • M
Information Exposure

[,59.0)
  • H
Improper Access Control

[,60.0)
  • L
CVE-2004-1449

[0.1,0.6]
  • C
Out-of-bounds Write

[,52.7.2)(52.7.2,59.0.1)
  • M
Information Exposure

[3.0,3.6.3]
  • H
Security Features

[,47.0)
  • H
Access Restriction Bypass

[,50.0)
  • H
Out-of-bounds Write

[,83.0)
  • M
Cross-site Scripting (XSS)

[,3.0.9)
  • H
Improper Input Validation

[,52.0)
  • H
Out-of-Bounds

[1.5,1.5.0.10)[2.0,2.0.0.2)
  • H
Information Exposure

[,74.0)
  • C
Use After Free

[24.0,24.5)(24.5,29.0)
  • L
Denial of Service (DoS)

[,1.5.0.3]
  • H
Out-of-Bounds

[,63.0)
  • M
Cross-site Scripting (XSS)

[,2.0.0.8)
  • C
Out-of-Bounds

[,52.8.0)
  • M
Authentication Bypass

[,0.7][0.7,0.9.1)
  • H
Denial of Service (DoS)

[,3.1.18)(3.1.18,3.6.26)[4.0,5.0][5.0,10.0)
  • L
Access Restriction Bypass

[,28.0)
  • M
Cross-site Scripting (XSS)

[,3.6.24)[4.0,7.0.1)
  • H
CVE-2021-23962

[,85.0)
  • C
Out-of-Bounds

[,57.0)
  • H
Insecure Permissions

[,50.0)
  • M
Cross-site Scripting (XSS)

[0,)
  • M
Improper Input Validation

[,37.0)
  • C
Denial of Service (DoS)

[,7.0)
  • M
CVE-2020-26967

[,83.0)
  • M
CVE-2013-0774

[,17.0.3)(17.0.3,19.0)
  • M
Information Exposure

[1.0,1.8]
  • M
Denial of Service (DoS)

[,3.5.2]
  • M
CVE-2005-2263

[0.8,1.0.4]
  • M
Cross-site Scripting (XSS)

[17.0,17.0.10]
  • C
Out-of-Bounds

[,52.9)[53.0,60.1.0)(60.1.0,61.0)
  • H
Arbitrary Code Execution

[0.8,1.0.2]
  • H
Arbitrary Code Execution

[,1.5.0.4)
  • H
Out-of-Bounds

[,78.11)(78.11,89.0)
  • C
Out-of-bounds Write

[,60.4)(60.4,64.0)
  • C
Out-of-Bounds

[,40.0)
  • C
Out-of-Bounds

[,3.5.17)
  • M
Information Exposure

[,2.1.0][2.1.0,39.0.3)
  • M
Authentication Bypass

[0.9.1,0.9.2]
  • H
Security Features

[,51.0)
  • M
Improper Input Validation

[,70.0)
  • H
Denial of Service (DoS)

[3.5.1,3.5.3]
  • M
Improper Input Validation

[,43.0)
  • M
Access Restriction Bypass

[,45.8.0)(45.8.0,52.0)
  • M
Improper Access Control

[,47.0)
  • H
Integer Overflow or Wraparound

[,60.0)(60.0,60.1)(60.1,61.0)
  • C
Denial of Service (DoS)

[,3.1.10)
  • H
Authentication Bypass

[,1.0]
  • C
Resource Management Errors

[,3.0.12)
  • M
Access Restriction Bypass

[,3.0.18)
  • C
Out-of-Bounds

[,52.5.0)(52.5.0,57.0)
  • M
Access Restriction Bypass

[,17.0.7][17.0.7,23.0)
  • H
Out-of-Bounds

[,38.6.0][38.6.0,45.0)
  • C
Use After Free

[,52.4.0)(52.4.0,56.0)
  • M
Improper Authentication

[10.0,10.0.12)[17.0,17.0.2)(17.0.2,18.0)
  • C
Resource Management Errors

[,3.0.12)
  • C
Integer Overflow or Wraparound

[,52.6.0)(52.6.0,58.0)
  • H
Out-of-Bounds

[,3.6]
  • M
Insufficiently Protected Credentials

[78.8.1,78.10.2)
  • M
Improper Input Validation

[,86.0)
  • M
Access Restriction Bypass

[4.0,9.0]
  • H
Privilege Escalation

[24.0,24.5)(24.5,29.0)
  • M
Access Restriction Bypass

[,17.0.9][17.0.9,24.0)
  • C
Use After Free

[,45.7.0)(45.7.0,51.0)
  • C
Privilege Escalation

[24.0,24.4)(24.4,28.0)
  • M
Access Restriction Bypass

[,67.0.2)
  • H
Denial of Service (DoS)

[,38.6.0][38.6.0,45.0)
  • L
Access Restriction Bypass

[4.0,11.0]
  • M
CVE-2007-3827

[0,)
  • M
Remote Code Execution (RCE)

[1.0,1.5]
  • H
Out-of-Bounds

[,41.0)
  • M
Resource Management Errors

[,2.0.0.14]
  • C
Resource Management Errors

[,2.0.0.20][2.0.0.20,3.0.7)
  • H
Denial of Service (DoS)

[,35.0)
  • H
Access Restriction Bypass

[4.0,10.2]
  • H
Resource Management Errors

[,3.0.18)
  • H
Out-of-Bounds

[,3.0.6][3.0.6,3.5.12)
  • M
Denial of Service (DoS)

[,1.0.8)
  • C
Out-of-Bounds

[,43.0)
  • C
Out-of-Bounds

[,68.6.0)(68.6.0,74.0)
  • H
Resource Management Errors

[4.0,8.0]
  • H
Resource Management Errors

[4.0,8.0]
  • H
Improper Access Control

[,58)
  • H
Out-of-bounds Write

[,68.4)(68.4,72.0)
  • H
Remote Code Execution (RCE)

[,52.3.0)(52.3.0,55.0)
  • M
Use of a Risky Cryptographic Algorithm

[,78.9.1)
  • M
Directory Traversal

[2.0,2.0.0.3]
  • M
Information Exposure

[,49.0.2)
  • M
Security Features

[,45.0)
  • M
Cross-site Scripting (XSS)

[,2.0.0.15)
  • H
Use After Free

[10.0,10.0.11)(10.0.11,17.0)
  • M
Improper Check for Unusual or Exceptional Conditions

[,78.1)(78.1,79.0)
  • M
Improper Input Validation

[,50.0)
  • C
Out-of-bounds Write

[,58)
  • M
Denial of Service (DoS)

[1.0.6,1.0.7]
  • H
Denial of Service (DoS)

[3.0,3.6.6]
  • M
Improper Input Validation

[,53.0)
  • M
Cross-site Scripting (XSS)

[,16.0)
  • M
Cross-site Scripting (XSS)

[4.0,13.0]
  • M
Improper Access Control

[,41.0.2)
  • M
Cross-site Scripting (XSS)

[,52.4.0)(52.4.0,56.0)
  • H
Use After Free

[,68.10.0)(68.10.0,78.0)
  • M
Information Exposure

[,80.0)
  • M
Arbitrary Code Execution

[,1.5.0.9]
  • C
Resource Management Errors

[,2.0.0.15)
  • H
Out-of-Bounds

[,45.1.0)
  • M
Symlink Attack

[,2.0.0.13)
  • H
Out-of-bounds Write

[,68.7.0)(68.7.0,75.0)
  • C
Out-of-Bounds

[,45.5.0)(45.5.0,50.0)
  • H
Arbitrary Code Execution

[,1.0.7)
  • M
Improper Input Validation

[3.0,3.0.8]
  • C
Resource Management Errors

[4.0,13.0]
  • C
Out-of-bounds Read