25 results (0.110 seconds)

CVSS: 8.6EPSS: 0%CPEs: -EXPL: 0

An error in the ECMA-262 specification relating to Async Generators could have resulted in a type confusion, potentially leading to memory corruption and an exploitable crash. This vulnerability affects Firefox < 128, Firefox ESR < 115.13, Thunderbird < 115.13, and Thunderbird < 128. ... The Mozilla Foundation Security Advisory describes this flaw as follows: An error in the ECMA-262 specification relating to Async Generators could have resulted in a type confusion, potentially leading to memory corruption and an exploitable crash. • https://bugzilla.mozilla.org/show_bug.cgi?id=1901411 https://github.com/tc39/ecma262/security/advisories/GHSA-g38c-wh3c-5h9r https://www.mozilla.org/security/advisories/mfsa2024-29 https://www.mozilla.org/security/advisories/mfsa2024-30 https://www.mozilla.org/security/advisories/mfsa2024-31 https://www.mozilla.org/security/advisories/mfsa2024-32 https://access.redhat.com/security/cve/CVE-2024-7652 https://bugzilla.redhat.com/show_bug.cgi?id=2310490 • CWE-476: NULL Pointer Dereference CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') •

CVSS: 9.8EPSS: 0%CPEs: -EXPL: 0

A difference in the handling of StructFields and ArrayTypes in WASM could be used to trigger an exploitable type confusion vulnerability. This vulnerability affects Firefox < 130 and Firefox ESR < 128.2. A difference in the handling of StructFields and ArrayTypes in WASM could be used to trigger an exploitable type confusion vulnerability. This vulnerability affects Firefox < 130, Firefox ESR < 128.2, and Thunderbird < 128.2. The Mozilla Foundation's Security Advisory: A difference in the handling of StructFields and ArrayTypes in WASM could be used to trigger an exploitable type confusion vulnerability. • https://bugzilla.mozilla.org/show_bug.cgi?id=1911909 https://www.mozilla.org/security/advisories/mfsa2024-39 https://www.mozilla.org/security/advisories/mfsa2024-40 https://www.mozilla.org/security/advisories/mfsa2024-43 https://access.redhat.com/security/cve/CVE-2024-8385 https://bugzilla.redhat.com/show_bug.cgi?id=2309431 • CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') •

CVSS: 9.8EPSS: 0%CPEs: -EXPL: 0

A potentially exploitable type confusion could be triggered when looking up a property name on an object being used as the `with` environment. This vulnerability affects Firefox < 130, Firefox ESR < 128.2, and Firefox ESR < 115.15. A potentially exploitable type confusion could be triggered when looking up a property name on an object being used as the `with` environment. This vulnerability affects Firefox < 130, Firefox ESR < 128.2, Firefox ESR < 115.15, Thunderbird < 128.2, and Thunderbird < 115.15. The Mozilla Foundation's Security Advisory: A potentially exploitable type confusion could be triggered when looking up a property name on an object being used as the with environment. • https://bugzilla.mozilla.org/show_bug.cgi?id=1912715 https://www.mozilla.org/security/advisories/mfsa2024-39 https://www.mozilla.org/security/advisories/mfsa2024-40 https://www.mozilla.org/security/advisories/mfsa2024-41 https://www.mozilla.org/security/advisories/mfsa2024-43 https://www.mozilla.org/security/advisories/mfsa2024-44 https://access.redhat.com/security/cve/CVE-2024-8381 https://bugzilla.redhat.com/show_bug.cgi?id=2309427 • CWE-704: Incorrect Type Conversion or Cast CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') •

CVSS: 8.8EPSS: 0%CPEs: -EXPL: 0

A type confusion bug in WebAssembly could be leveraged by an attacker to potentially achieve code execution. This vulnerability affects Firefox < 129 and Firefox ESR < 128.1. A type confusion bug in WebAssembly could be leveraged by an attacker to potentially achieve code execution. This vulnerability affects Firefox < 129, Firefox ESR < 128.1, and Thunderbird < 128.1. The Mozilla Foundation Security Advisory describes this flaw as: A type confusion bug in WebAssembly could be leveraged by an attacker to potentially achieve code execution. • https://bugzilla.mozilla.org/show_bug.cgi?id=1903041 https://www.mozilla.org/security/advisories/mfsa2024-33 https://www.mozilla.org/security/advisories/mfsa2024-35 https://www.mozilla.org/security/advisories/mfsa2024-37 https://access.redhat.com/security/cve/CVE-2024-7520 https://bugzilla.redhat.com/show_bug.cgi?id=2303137 •

CVSS: 7.5EPSS: 0%CPEs: -EXPL: 0

This vulnerability affects Firefox < 125, Firefox ESR < 115.10, and Thunderbird < 115.10. ... Esta vulnerabilidad afecta a Firefox &lt; 125 y Firefox ESR &lt; 115.10. • https://bugzilla.mozilla.org/show_bug.cgi?id=1883542 https://lists.debian.org/debian-lts-announce/2024/04/msg00012.html https://lists.debian.org/debian-lts-announce/2024/04/msg00013.html https://www.mozilla.org/security/advisories/mfsa2024-18 https://www.mozilla.org/security/advisories/mfsa2024-19 https://www.mozilla.org/security/advisories/mfsa2024-20 https://access.redhat.com/security/cve/CVE-2024-3852 https://bugzilla.redhat.com/show_bug.cgi?id=2275547 • CWE-386: Symbolic Name not Mapping to Correct Object CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') •