
CVE-2025-0239 – firefox: Alt-Svc ALPN validation failure when redirected
https://notcve.org/view.php?id=CVE-2025-0239
07 Jan 2025 — When using Alt-Svc, ALPN did not properly validate certificates when the original server is redirecting to an insecure site. This vulnerability affects Firefox < 134 and Firefox ESR < 128.6. When using Alt-Svc, ALPN did not properly validate certificates when the original server is redirecting to an insecure site. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird < 128.6. A flaw was found in Firefox. • https://bugzilla.mozilla.org/show_bug.cgi?id=1929156 • CWE-295: Improper Certificate Validation CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVE-2025-0238 – firefox: thunderbird: Use-after-free when breaking lines in text
https://notcve.org/view.php?id=CVE-2025-0238
07 Jan 2025 — Assuming a controlled failed memory allocation, an attacker could have caused a use-after-free, leading to a potentially exploitable crash. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, and Firefox ESR < 115.19. Assuming a controlled failed memory allocation, an attacker could have caused a use-after-free, leading to a potentially exploitable crash. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Firefox ESR < 115.19, Thunderbird < 134, and Thunderbird < 128.6. A flaw was fou... • https://bugzilla.mozilla.org/show_bug.cgi?id=1915535 • CWE-416: Use After Free •

CVE-2025-0237 – firefox: thunderbird: WebChannel APIs susceptible to confused deputy attack
https://notcve.org/view.php?id=CVE-2025-0237
07 Jan 2025 — The WebChannel API, which is used to transport various information across processes, did not check the sending principal but rather accepted the principal being sent. This could have led to privilege escalation attacks. This vulnerability affects Firefox < 134 and Firefox ESR < 128.6. The WebChannel API, which is used to transport various information across processes, did not check the sending principal but rather accepted the principal being sent. This could have led to privilege escalation attacks. • https://bugzilla.mozilla.org/show_bug.cgi?id=1915257 • CWE-441: Unintended Proxy or Intermediary ('Confused Deputy') CWE-863: Incorrect Authorization •

CVE-2025-0246
https://notcve.org/view.php?id=CVE-2025-0246
07 Jan 2025 — When using an invalid protocol scheme, an attacker could spoof the address bar. *Note: This issue only affected Android operating systems. Other operating systems are unaffected.* *Note: This issue is a different issue from CVE-2025-0244. This vulnerability affects Firefox < 134. • https://bugzilla.mozilla.org/show_bug.cgi?id=1912709 •

CVE-2025-0245
https://notcve.org/view.php?id=CVE-2025-0245
07 Jan 2025 — Under certain circumstances, a user opt-in setting that Focus should require authentication before use could have been be bypassed. This vulnerability affects Firefox < 134. • https://bugzilla.mozilla.org/show_bug.cgi?id=1895342 •

CVE-2025-0244
https://notcve.org/view.php?id=CVE-2025-0244
07 Jan 2025 — When redirecting to an invalid protocol scheme, an attacker could spoof the address bar. *Note: This issue only affected Android operating systems. Other operating systems are unaffected.* This vulnerability affects Firefox < 134. • https://bugzilla.mozilla.org/show_bug.cgi?id=1929584 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVE-2025-22376
https://notcve.org/view.php?id=CVE-2025-22376
03 Jan 2025 — In Net::OAuth::Client in the Net::OAuth package before 0.29 for Perl, the default nonce is a 32-bit integer generated from the built-in rand() function, which is not cryptographically strong. • https://metacpan.org/release/KGRENNAN/Net-OAuth-0.28/source/lib/Net/OAuth/Client.pm#L260 • CWE-338: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) •

CVE-2024-9427 – Koji: escape html tag characters in the query string
https://notcve.org/view.php?id=CVE-2024-9427
24 Dec 2024 — A vulnerability in Koji was found. An unsanitized input allows for an XSS attack. Javascript code from a malicious link could be reflected in the resulting web page. It is not expected to be able to submit an action or make a change in Koji due to existing XSS protections in the code Se encontró una vulnerabilidad en Koji. Una entrada no desinfectada permite un ataque XSS. • https://bugzilla.redhat.com/show_bug.cgi?id=2316047 • CWE-116: Improper Encoding or Escaping of Output •

CVE-2024-45819 – libxl leaks data to PVH guests via ACPI tables
https://notcve.org/view.php?id=CVE-2024-45819
19 Dec 2024 — PVH guests have their ACPI tables constructed by the toolstack. The construction involves building the tables in local memory, which are then copied into guest memory. While actually used parts of the local memory are filled in correctly, excess space that is being allocated is left with its prior contents. PVH guests have their ACPI tables constructed by the toolstack. The construction involves building the tables in local memory, which are then copied into guest memory. • https://xenbits.xenproject.org/xsa/advisory-464.html • CWE-276: Incorrect Default Permissions •

CVE-2024-45818 – Deadlock in x86 HVM standard VGA handling
https://notcve.org/view.php?id=CVE-2024-45818
19 Dec 2024 — The hypervisor contains code to accelerate VGA memory accesses for HVM guests, when the (virtual) VGA is in "standard" mode. Locking involved there has an unusual discipline, leaving a lock acquired past the return from the function that acquired it. This behavior results in a problem when emulating an instruction with two memory accesses, both of which touch VGA memory (plus some further constraints which aren't relevant here). When emulating the 2nd access, the lock that is already being held would be att... • https://xenbits.xenproject.org/xsa/advisory-463.html • CWE-667: Improper Locking •