
CVE-2020-12394 – Ubuntu Security Notice USN-4353-2
https://notcve.org/view.php?id=CVE-2020-12394
12 May 2020 — A logic flaw in our location bar implementation could have allowed a local attacker to spoof the current location by selecting a different origin and removing focus from the input element. This vulnerability affects Firefox < 76. Un fallo lógico en nuestra implementación de la barra de ubicación podría haber permitido a un atacante local falsificar la ubicación actual al seleccionar un origen diferente y eliminar el foco del elemento de entrada. Esta vulnerabilidad afecta a Firefox versiones anteriores a 76... • https://bugzilla.mozilla.org/show_bug.cgi?id=1628288 •

CVE-2020-12387 – Mozilla: Use-after-free during worker shutdown
https://notcve.org/view.php?id=CVE-2020-12387
06 May 2020 — A race condition when running shutdown code for Web Worker led to a use-after-free vulnerability. This resulted in a potentially exploitable crash. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0. Una condición de carrera cuando se ejecuta el código shutdown para Web Worker conllevo a una vulnerabilidad de uso de la memoria previamente liberada. Esto resultó en un bloqueo potencialmente explotable. • https://bugzilla.mozilla.org/show_bug.cgi?id=1545345 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') CWE-416: Use After Free •

CVE-2020-12392 – Mozilla: Arbitrary local file access with 'Copy as cURL'
https://notcve.org/view.php?id=CVE-2020-12392
06 May 2020 — The 'Copy as cURL' feature of Devtools' network tab did not properly escape the HTTP POST data of a request, which can be controlled by the website. If a user used the 'Copy as cURL' feature and pasted the command into a terminal, it could have resulted in the disclosure of local files. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0. La funcionalidad "Copy as cURL" de la pestaña de red de Devtools no escapa apropiadamente los datos HTTP POST de una petición, que el sit... • https://bugzilla.mozilla.org/show_bug.cgi?id=1614468 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-552: Files or Directories Accessible to External Parties •

CVE-2020-12395 – Mozilla: Memory safety bugs fixed in Firefox 76 and Firefox ESR 68.8
https://notcve.org/view.php?id=CVE-2020-12395
06 May 2020 — Mozilla developers and community members reported memory safety bugs present in Firefox 75 and Firefox ESR 68.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0. Los desarrolladores de Mozilla y los miembros de la comunidad informaron bugs de seguridad de la memoria presentes en Firefox versión 75 y Firefox ESR ver... • https://bugzilla.mozilla.org/buglist.cgi?bug_id=1595886%2C1611482%2C1614704%2C1624098%2C1625749%2C1626382%2C1628076%2C1631508 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') CWE-787: Out-of-bounds Write •

CVE-2020-6831 – usrsctp: Buffer overflow in AUTH chunk input validation
https://notcve.org/view.php?id=CVE-2020-6831
06 May 2020 — A buffer overflow could occur when parsing and validating SCTP chunks in WebRTC. This could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0. Podría presentarse un desbordamiento del búfer cuando se analizan y comprueban fragmentos SCTP en WebRTC. Esto podría haber provocado una corrupción en la memoria y un bloqueo potencialmente explotable. • https://packetstorm.news/files/id/158480 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') CWE-787: Out-of-bounds Write •

CVE-2020-6826 – Gentoo Linux Security Advisory 202004-11
https://notcve.org/view.php?id=CVE-2020-6826
23 Apr 2020 — Mozilla developers Tyson Smith, Bob Clary, and Alexandru Michis reported memory safety bugs present in Firefox 74. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 75. Los desarrolladores de Mozilla, Tyson Smith, Bob Clary y Alexandru Michis reportaron bugs de seguridad de la memoria presentes en Firefox versión 74. Algunos de estos bugs mostraron evidencia de cor... • https://bugzilla.mozilla.org/buglist.cgi?bug_id=1613009%2C1613195%2C1616734%2C1617488%2C1619229%2C1620719%2C1624897 • CWE-787: Out-of-bounds Write •

CVE-2020-6821 – Mozilla: Uninitialized memory could be read when using the WebGL copyTexSubImage method
https://notcve.org/view.php?id=CVE-2020-6821
08 Apr 2020 — When reading from areas partially or fully outside the source resource with WebGL's copyTexSubImage
method, the specification requires the returned values be zero. Previously, this memory was uninitialized, leading to potentially sensitive data disclosure. This vulnerability affects Thunderbird < 68.7.0, Firefox ESR < 68.7, and Firefox < 75. Cuando se lee desde áreas parcial o completamente fuera del recurso fuente con el método copyTexSubImage
de WebGL, la especificación requiere ... • https://bugzilla.mozilla.org/show_bug.cgi?id=1625404 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-908: Use of Uninitialized Resource •

CVE-2020-6822 – Mozilla: Out of bounds write in GMPDecodeData when processing large images
https://notcve.org/view.php?id=CVE-2020-6822
08 Apr 2020 — On 32-bit builds, an out of bounds write could have occurred when processing an image larger than 4 GB in GMPDecodeData
. It is possible that with enough effort this could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 68.7.0, Firefox ESR < 68.7, and Firefox < 75. En las compilaciones de 32 bits, podría haber ocurrido una escritura fuera de límites al procesar una imagen de más de 4 GB en (code)GMPDecodeData(/code). Es posible que con suficiente esfuerzo esto... • https://bugzilla.mozilla.org/show_bug.cgi?id=1544181 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-787: Out-of-bounds Write •

CVE-2020-6823 – Gentoo Linux Security Advisory 202004-11
https://notcve.org/view.php?id=CVE-2020-6823
08 Apr 2020 — A malicious extension could have called browser.identity.launchWebAuthFlow
, controlling the redirect_uri, and through the Promise returned, obtain the Auth code and gain access to the user's account at the service provider. This vulnerability affects Firefox < 75. Una extensión maliciosa podría haber llamado (code)browser.identity.launchWebAuthFlow(/code), controlando el redirect_uri y, por medio de la Promesa devuelta, obtenga el código de Autenticación y consiga acceso a la cuenta del usuario... • https://bugzilla.mozilla.org/show_bug.cgi?id=1614919 • CWE-862: Missing Authorization •

CVE-2020-6824 – Gentoo Linux Security Advisory 202004-11
https://notcve.org/view.php?id=CVE-2020-6824
08 Apr 2020 — Initially, a user opens a Private Browsing Window and generates a password for a site, then closes the Private Browsing Window but leaves Firefox open. Subsequently, if the user had opened a new Private Browsing Window, revisited the same site, and generated a new password - the generated passwords would have been identical, rather than independent. This vulnerability affects Firefox < 75. Inicialmente, un usuario abre una Ventana de Navegación Privada y genera una contraseña para un sitio, luego cierra la ... • https://bugzilla.mozilla.org/show_bug.cgi?id=1621853 • CWE-384: Session Fixation •