![](/assets/img/cve_300x82_sin_bg.png)
CVE-2021-23961 – Mozilla: More internal network hosts could have been probed by a malicious webpage
https://notcve.org/view.php?id=CVE-2021-23961
01 Feb 2021 — Further techniques that built on the slipstream research combined with a malicious webpage could have exposed both an internal network's hosts as well as services running on the user's local machine. This vulnerability affects Firefox < 85. Otras técnicas que se basaron en la investigación de slipstream combinada con una página web maliciosa podrían haber expuesto tanto los hosts de una red interna como los servicios que se ejecutan en la máquina local del usuario. Esta vulnerabilidad afecta a Firefox ... • https://bugzilla.mozilla.org/show_bug.cgi?id=1677940 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2021-23964 – Mozilla: Memory safety bugs fixed in Firefox 85 and Firefox ESR 78.7
https://notcve.org/view.php?id=CVE-2021-23964
28 Jan 2021 — Mozilla developers reported memory safety bugs present in Firefox 84 and Firefox ESR 78.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 85, Thunderbird < 78.7, and Firefox ESR < 78.7. Los desarrolladores de Mozilla reportaron bugs de seguridad de la memoria presentes en Firefox versión 84 y Firefox ESR versión 78.6. Algunos de estos bugs mostraron evidenc... • https://bugzilla.mozilla.org/buglist.cgi?bug_id=1662507%2C1666285%2C1673526%2C1674278%2C1674835%2C1675097%2C1675844%2C1675868%2C1677590%2C1677888%2C1680410%2C1681268%2C1682068%2C1682938%2C1683736%2C1685260%2C1685925 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') CWE-787: Out-of-bounds Write •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2021-23960 – Mozilla: Use-after-poison for incorrectly redeclared JavaScript variables during GC
https://notcve.org/view.php?id=CVE-2021-23960
28 Jan 2021 — Performing garbage collection on re-declared JavaScript variables resulted in a user-after-poison, and a potentially exploitable crash. This vulnerability affects Firefox < 85, Thunderbird < 78.7, and Firefox ESR < 78.7. Realizar una recolección de basura en variables de JavaScript declaradas nuevamente resultó en un usuario después del envenenamiento y un bloqueo potencialmente explotable. Esta vulnerabilidad afecta a Firefox versiones anteriores a 85, Thunderbird versiones anteriores a 78,7 y Firefox... • https://bugzilla.mozilla.org/show_bug.cgi?id=1675755 • CWE-626: Null Byte Interaction Error (Poison Null Byte) •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2021-23954 – Mozilla: Type confusion when using logical assignment operators in JavaScript switch statements
https://notcve.org/view.php?id=CVE-2021-23954
28 Jan 2021 — Using the new logical assignment operators in a JavaScript switch statement could have caused a type confusion, leading to a memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 85, Thunderbird < 78.7, and Firefox ESR < 78.7. Usando los nuevos operadores de asignación lógica en una declaración de cambio de JavaScript podría haber causado una confusión de tipos, conllevando a una corrupción de la memoria y un bloqueo potencialmente explotable. Esta vulnerabilidad a... • https://bugzilla.mozilla.org/show_bug.cgi?id=1684020 • CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2021-23953 – Mozilla: Cross-origin information leakage via redirected PDF requests
https://notcve.org/view.php?id=CVE-2021-23953
28 Jan 2021 — If a user clicked into a specifically crafted PDF, the PDF reader could be confused into leaking cross-origin information, when said information is served as chunked data. This vulnerability affects Firefox < 85, Thunderbird < 78.7, and Firefox ESR < 78.7. Si un usuario hace clic en un PDF diseñado específicamente, el lector de PDF podría confundirse y filtrar información de origen cruzado, cuando dicha información es servida como datos fragmentados. Esta vulnerabilidad afecta a Firefox versiones anter... • https://bugzilla.mozilla.org/show_bug.cgi?id=1683940 • CWE-829: Inclusion of Functionality from Untrusted Control Sphere •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-26975
https://notcve.org/view.php?id=CVE-2020-26975
07 Jan 2021 — When a malicious application installed on the user's device broadcast an Intent to Firefox for Android, arbitrary headers could have been specified, leading to attacks such as abusing ambient authority or session fixation. This was resolved by only allowing certain safe-listed headers. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 84. • https://bugzilla.mozilla.org/show_bug.cgi?id=1661071 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-26977
https://notcve.org/view.php?id=CVE-2020-26977
07 Jan 2021 — By attempting to connect a website using an unresponsive port, an attacker could have controlled the content of a tab while the URL bar displayed the original domain. *Note: This issue only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 84. Al intentar conectar un sitio web usando un puerto que no responde, un atacante podría haber controlado el contenido de una pestaña mientras la barra de URL mostraba el dominio original. • https://bugzilla.mozilla.org/show_bug.cgi?id=1676311 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-26979
https://notcve.org/view.php?id=CVE-2020-26979
07 Jan 2021 — When a user typed a URL in the address bar or the search bar and quickly hit the enter key, a website could sometimes capture that event and then redirect the user before navigation occurred to the desired, entered address. To construct a convincing spoof the attacker would have had to guess what the user was typing, perhaps by suggesting it. This vulnerability affects Firefox < 84. Cuando un usuario escribió una URL en la barra de direcciones o en la barra de búsqueda y presionó rápidamente la tecla Intro,... • https://bugzilla.mozilla.org/buglist.cgi?bug_id=1641287%2C1673299 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-35112
https://notcve.org/view.php?id=CVE-2020-35112
07 Jan 2021 — If a user downloaded a file lacking an extension on Windows, and then "Open"-ed it from the downloads panel, if there was an executable file in the downloads directory with the same name but with an executable extension (such as .bat or .exe) that executable would have been launched instead. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox < 84, Thunderbird < 78.6, and Firefox ESR < 78.6. Si un usuario descargó un archivo... • https://bugzilla.mozilla.org/show_bug.cgi?id=1661365 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-26974 – Mozilla: Incorrect cast of StyleGenericFlexBasis resulted in a heap use-after-free
https://notcve.org/view.php?id=CVE-2020-26974
16 Dec 2020 — When flex-basis was used on a table wrapper, a StyleGenericFlexBasis object could have been incorrectly cast to the wrong type. This resulted in a heap user-after-free, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox < 84, Thunderbird < 78.6, and Firefox ESR < 78.6. Cuando flex-basis fue usada en un contenedor de tabla, un objeto StyleGenericFlexBasis podría haberse convertido incorrectamente en el tipo equivocado. Esto resultó en uso de la memoria previamente... • https://bugzilla.mozilla.org/show_bug.cgi?id=1681022 • CWE-416: Use After Free CWE-787: Out-of-bounds Write •