
CVE-2021-23973 – Mozilla: MediaError message property could have leaked information about cross-origin resources
https://notcve.org/view.php?id=CVE-2021-23973
25 Feb 2021 — When trying to load a cross-origin resource in an audio/video context a decoding error may have resulted, and the content of that error may have revealed information about the resource. This vulnerability affects Firefox < 86, Thunderbird < 78.8, and Firefox ESR < 78.8. Cuando se intenta cargar un recurso de origen cruzado en un contexto de audio y video, puede haber resultado un error de decodificación, y el contenido de ese error puede haber divulgado información sobre el recurso. Esta vulnerabilidad... • https://bugzilla.mozilla.org/show_bug.cgi?id=1690976 • CWE-209: Generation of Error Message Containing Sensitive Information •

CVE-2021-23969 – Mozilla: Content Security Policy violation report could have contained the destination of a redirect
https://notcve.org/view.php?id=CVE-2021-23969
25 Feb 2021 — As specified in the W3C Content Security Policy draft, when creating a violation report, "User agents need to ensure that the source file is the URL requested by the page, pre-redirects. If that’s not possible, user agents need to strip the URL down to an origin to avoid unintentional leakage." Under certain types of redirects, Firefox incorrectly set the source file to be the destination of the redirects. This was fixed to be the redirect destination's origin. This vulnerability affects Firefox < 86, Thund... • https://bugzilla.mozilla.org/show_bug.cgi?id=1542194 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2021-23964 – Mozilla: Memory safety bugs fixed in Firefox 85 and Firefox ESR 78.7
https://notcve.org/view.php?id=CVE-2021-23964
28 Jan 2021 — Mozilla developers reported memory safety bugs present in Firefox 84 and Firefox ESR 78.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 85, Thunderbird < 78.7, and Firefox ESR < 78.7. Los desarrolladores de Mozilla reportaron bugs de seguridad de la memoria presentes en Firefox versión 84 y Firefox ESR versión 78.6. Algunos de estos bugs mostraron evidenc... • https://bugzilla.mozilla.org/buglist.cgi?bug_id=1662507%2C1666285%2C1673526%2C1674278%2C1674835%2C1675097%2C1675844%2C1675868%2C1677590%2C1677888%2C1680410%2C1681268%2C1682068%2C1682938%2C1683736%2C1685260%2C1685925 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') CWE-787: Out-of-bounds Write •

CVE-2020-15685 – Mozilla: IMAP Response Injection when using STARTTLS
https://notcve.org/view.php?id=CVE-2020-15685
28 Jan 2021 — During the plaintext phase of the STARTTLS connection setup, protocol commands could have been injected and evaluated within the encrypted session. This vulnerability affects Thunderbird < 78.7. Durante la fase de texto plano de la configuración de la conexión STARTTLS, se podrían haber inyectado y evaluado comandos de protocolo dentro de la sesión cifrada. Esta vulnerabilidad afecta a Thunderbird < 78.7. A flaw was found in Mozilla. • https://bugzilla.mozilla.org/show_bug.cgi?id=1622640 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') CWE-924: Improper Enforcement of Message Integrity During Transmission in a Communication Channel •

CVE-2021-23960 – Mozilla: Use-after-poison for incorrectly redeclared JavaScript variables during GC
https://notcve.org/view.php?id=CVE-2021-23960
28 Jan 2021 — Performing garbage collection on re-declared JavaScript variables resulted in a user-after-poison, and a potentially exploitable crash. This vulnerability affects Firefox < 85, Thunderbird < 78.7, and Firefox ESR < 78.7. Realizar una recolección de basura en variables de JavaScript declaradas nuevamente resultó en un usuario después del envenenamiento y un bloqueo potencialmente explotable. Esta vulnerabilidad afecta a Firefox versiones anteriores a 85, Thunderbird versiones anteriores a 78,7 y Firefox... • https://bugzilla.mozilla.org/show_bug.cgi?id=1675755 • CWE-626: Null Byte Interaction Error (Poison Null Byte) •

CVE-2021-23954 – Mozilla: Type confusion when using logical assignment operators in JavaScript switch statements
https://notcve.org/view.php?id=CVE-2021-23954
28 Jan 2021 — Using the new logical assignment operators in a JavaScript switch statement could have caused a type confusion, leading to a memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 85, Thunderbird < 78.7, and Firefox ESR < 78.7. Usando los nuevos operadores de asignación lógica en una declaración de cambio de JavaScript podría haber causado una confusión de tipos, conllevando a una corrupción de la memoria y un bloqueo potencialmente explotable. Esta vulnerabilidad a... • https://bugzilla.mozilla.org/show_bug.cgi?id=1684020 • CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') •

CVE-2021-23953 – Mozilla: Cross-origin information leakage via redirected PDF requests
https://notcve.org/view.php?id=CVE-2021-23953
28 Jan 2021 — If a user clicked into a specifically crafted PDF, the PDF reader could be confused into leaking cross-origin information, when said information is served as chunked data. This vulnerability affects Firefox < 85, Thunderbird < 78.7, and Firefox ESR < 78.7. Si un usuario hace clic en un PDF diseñado específicamente, el lector de PDF podría confundirse y filtrar información de origen cruzado, cuando dicha información es servida como datos fragmentados. Esta vulnerabilidad afecta a Firefox versiones anter... • https://bugzilla.mozilla.org/show_bug.cgi?id=1683940 • CWE-829: Inclusion of Functionality from Untrusted Control Sphere •

CVE-2020-35112
https://notcve.org/view.php?id=CVE-2020-35112
07 Jan 2021 — If a user downloaded a file lacking an extension on Windows, and then "Open"-ed it from the downloads panel, if there was an executable file in the downloads directory with the same name but with an executable extension (such as .bat or .exe) that executable would have been launched instead. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox < 84, Thunderbird < 78.6, and Firefox ESR < 78.6. Si un usuario descargó un archivo... • https://bugzilla.mozilla.org/show_bug.cgi?id=1661365 •

CVE-2020-26974 – Mozilla: Incorrect cast of StyleGenericFlexBasis resulted in a heap use-after-free
https://notcve.org/view.php?id=CVE-2020-26974
16 Dec 2020 — When flex-basis was used on a table wrapper, a StyleGenericFlexBasis object could have been incorrectly cast to the wrong type. This resulted in a heap user-after-free, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox < 84, Thunderbird < 78.6, and Firefox ESR < 78.6. Cuando flex-basis fue usada en un contenedor de tabla, un objeto StyleGenericFlexBasis podría haberse convertido incorrectamente en el tipo equivocado. Esto resultó en uso de la memoria previamente... • https://bugzilla.mozilla.org/show_bug.cgi?id=1681022 • CWE-416: Use After Free CWE-787: Out-of-bounds Write •

CVE-2020-26971 – Mozilla: Heap buffer overflow in WebGL
https://notcve.org/view.php?id=CVE-2020-26971
16 Dec 2020 — Certain blit values provided by the user were not properly constrained leading to a heap buffer overflow on some video drivers. This vulnerability affects Firefox < 84, Thunderbird < 78.6, and Firefox ESR < 78.6. Determinados valores de blit proporcionados por el usuario no se restringieron apropiadamente, conllevando a un desbordamiento del búfer de pila en algunos controladores de video. Esta vulnerabilidad afecta a Firefox versiones anteriores a 84, Thunderbird versiones anteriores a 78,6 y Firefox ... • https://bugzilla.mozilla.org/show_bug.cgi?id=1663466 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') CWE-787: Out-of-bounds Write •