firefox-esr vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the firefox-esr package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Out-of-bounds Read

*
  • H
Out-of-Bounds

*
  • H
Use After Free

*
  • M
Improper Certificate Validation

*
  • H
Use After Free

*
  • H
Out-of-Bounds

<68.9.0esr-1~deb8u2
  • H
Insufficient Verification of Data Authenticity

<68.9.0esr-1~deb8u2
  • M
Use After Free

<68.9.0esr-1~deb8u2
  • M
Information Exposure

<68.9.0esr-1~deb8u2
  • H
Race Condition

<68.8.0esr-1~deb8u1
  • C
Buffer Overflow

<68.8.0esr-1~deb8u1
  • M
Information Exposure

<68.8.0esr-1~deb8u1
  • C
Out-of-Bounds

<68.8.0esr-1~deb8u1
  • H
Out-of-Bounds

<68.7.0esr-1~deb8u1
  • C
Out-of-Bounds

<68.7.0esr-1~deb8u1
  • H
Out-of-bounds Write

<68.7.0esr-1~deb8u1
  • H
Use After Free

<68.7.0esr-1~deb8u1
  • H
Double Free

<68.7.0esr-1~deb8u1
  • M
Information Exposure

<68.6.0esr-1~deb8u1
  • H
Use After Free

<68.6.0esr-1~deb8u1
  • H
Use After Free

<68.6.0esr-1~deb8u1
  • H
Arbitrary Code Injection

<68.6.0esr-1~deb8u1
  • H
Out-of-bounds Read

<68.6.0esr-1~deb8u1
  • C
Out-of-Bounds

<68.6.0esr-1~deb8u1
  • M
Out-of-bounds Read

<68.6.0esr-1~deb8u1
  • M
Cross-site Scripting (XSS)

<68.5.0esr-1~deb8u1
  • H
Out-of-Bounds

<68.5.0esr-1~deb8u1
  • H
Out-of-bounds Write

<68.5.0esr-1~deb8u1
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<68.4.1esr-1~deb8u1
  • H
Buffer Overflow

<68.4.0esr-1~deb8u1
  • M
Cross-site Scripting (XSS)

<68.4.0esr-1~deb8u1
  • M
Cross-site Scripting (XSS)

<68.4.0esr-1~deb8u1
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<68.4.0esr-1~deb8u1
  • H
Use After Free

<68.3.0esr-1~deb8u1
  • H
Use After Free

<68.3.0esr-1~deb8u1
  • H
Use After Free

<68.3.0esr-1~deb8u1
  • H
Buffer Overflow

<68.3.0esr-1~deb8u1
  • H
Buffer Overflow

<68.3.0esr-1~deb8u1
  • M
Origin Validation Error

<68.2.0esr-1~deb8u1
  • M
Race Condition

<68.2.0esr-1~deb8u1
  • M
Cross-site Scripting (XSS)

<68.2.0esr-1~deb8u1
  • H
Use After Free

<68.2.0esr-1~deb8u1
  • H
Out-of-bounds Write

<68.2.0esr-1~deb8u1
  • H
Use After Free

<68.2.0esr-1~deb8u1
  • H
Buffer Overflow

<68.2.0esr-1~deb8u1
  • H
Out-of-bounds Read

<68.2.0esr-1~deb8u1
  • L
Information Exposure

<60.9.0esr-1~deb8u1
  • H
Out-of-Bounds

<60.9.0esr-1~deb8u1
  • H
Use After Free

<60.9.0esr-1~deb8u1
  • H
Use After Free

<60.9.0esr-1~deb8u1
  • C
Improper Input Validation

<60.9.0esr-1~deb8u1
  • M
Inclusion of Functionality from Untrusted Control Sphere

<60.9.0esr-1~deb8u1
  • M
Cross-site Scripting (XSS)

<60.9.0esr-1~deb8u1
  • H
Arbitrary Code Injection

<60.8.0esr-1~deb8u1
  • H
Out-of-Bounds

<60.8.0esr-1
  • C
Use After Free

<60.8.0esr-1~deb8u1
  • H
Cross-site Request Forgery (CSRF)

<60.8.0esr-1~deb8u1
  • M
Cross-site Scripting (XSS)

<60.8.0esr-1~deb8u1
  • M
CVE-2019-11730

<60.8.0esr-1~deb8u1
  • M
Improper Encoding or Escaping of Output

<60.8.0esr-1~deb8u1
  • H
Out-of-bounds Read

<60.8.0esr-1
  • C
Out-of-Bounds

<60.8.0esr-1~deb8u1
  • H
CVE-2019-11711

<60.8.0esr-1~deb8u1
  • M
Information Exposure

<68.2.0esr-1
  • C
Improper Input Validation

<60.7.2esr-1
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<60.7.1esr-1~deb8u1
  • M
Information Exposure

*
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<60.7.0esr-1~deb8u1
  • M
Origin Validation Error

<60.7.0esr-1~deb8u1
  • C
Out-of-Bounds

<60.7.0esr-1~deb8u1
  • C
Use After Free

<60.7.0esr-1~deb8u1
  • C
Use After Free

<60.7.0esr-1~deb8u1
  • C
Out-of-Bounds

<60.7.0esr-1~deb8u1
  • C
Improper Input Validation

<60.7.0esr-1~deb8u1
  • C
Use After Free

<60.7.0esr-1~deb8u1
  • M
Improper Input Validation

<60.7.0esr-1~deb8u1
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<60.6.1esr-1~deb8u1
  • H
Out-of-Bounds

<60.6.1esr-1~deb8u1
  • C
Out-of-Bounds

<60.6.0esr-1~deb8u1
  • C
Reachable Assertion

<60.6.0esr-1~deb8u1
  • M
Out-of-Bounds

<60.6.0esr-1~deb8u1
  • C
Out-of-Bounds

<60.6.0esr-1~deb8u1
  • C
Use After Free

<60.6.0esr-1~deb8u1
  • C
Use After Free

<60.6.0esr-1~deb8u1
  • C
Improper Input Validation

<60.6.0esr-1~deb8u1
  • M
Origin Validation Error

<60.7.0esr-1~deb8u1
  • M
Out-of-bounds Read

<60.7.0esr-1~deb8u1
  • M
Origin Validation Error

<60.3.0esr-1~deb8u1
  • M
Information Exposure

<60.7.0esr-1~deb8u1
  • M
Out-of-bounds Write

<60.5.1esr-1~deb8u1
  • M
Use After Free

<60.7.0esr-1~deb8u1
  • C
Out-of-Bounds

<60.5.0esr-1~deb8u1
  • C
Improper Authentication

<60.5.0esr-1~deb8u1
  • C
Use After Free

<60.5.0esr-1~deb8u1
  • M
CVE-2018-18506

<60.6.0esr-1~deb8u1
  • C
Out-of-Bounds

<60.4.0esr-1~deb8u1
  • C
Use After Free

<60.4.0esr-1~deb8u1
  • C
Out-of-bounds Write

<60.4.0esr-1~deb8u1
  • C
Out-of-Bounds

<60.4.0esr-1~deb8u1
  • M
Origin Validation Error

<60.4.0esr-1~deb8u1
  • H
Out-of-bounds Write

<60.5.1esr-1~deb8u1
  • H
CVE-2018-12395

<60.3.0esr-1~deb8u1
  • M
Incorrect Permission Assignment for Critical Resource

<60.3.0esr-1~deb8u1
  • H
Information Exposure

<60.3.0esr-1~deb8u1
  • C
Out-of-Bounds

<60.3.0esr-1~deb8u1
  • H
Out-of-bounds Write

<60.3.0esr-1~deb8u1
  • H
Out-of-Bounds

<60.3.0esr-1~deb8u1
  • C
CVE-2018-12392

<60.3.0esr-1~deb8u1
  • H
Out-of-bounds Read

<60.4.0esr-1~deb8u1
  • H
Improper Input Validation

<60.2.1esr-1
  • C
Improper Input Validation

<60.2.2esr-1
  • H
Incorrect Type Conversion or Cast

<60.2.2esr-1
  • M
Insufficiently Protected Credentials

<60.2.1esr-1
  • C
Use After Free

<60.2.0esr-1
  • H
Out-of-bounds Write

<60.2.0esr-1
  • C
Out-of-Bounds

<60.2.0esr-1
  • C
Use After Free

<60.2.0esr-1
  • H
Cross-site Request Forgery (CSRF)

<52.9.0esr-1~deb8u1
  • H
Use After Free

<52.9.0esr-1~deb8u1
  • H
Use After Free

<52.9.0esr-1~deb8u1
  • M
Out-of-bounds Read

<52.9.0esr-1~deb8u1
  • H
Out-of-Bounds

<52.9.0esr-1~deb8u1
  • H
Integer Overflow or Wraparound

<52.9.0esr-1~deb8u1
  • M
Information Exposure

<52.9.0esr-1~deb8u1
  • C
Out-of-Bounds

<52.9.0esr-1~deb8u1
  • C
Improper Input Validation

<52.9.0esr-1~deb8u1
  • H
Out-of-Bounds

<52.2.0esr-1~deb8u1
  • L
CVE-2017-7775

<52.2.0esr-1~deb8u1
  • H
Out-of-Bounds

<52.2.0esr-1~deb8u1
  • H
Out-of-bounds Read

<52.2.0esr-1~deb8u1
  • C
Out-of-bounds Read

<52.2.0esr-1~deb8u1
  • H
Out-of-bounds Write

<52.8.1esr-1~deb8u1
  • H
Out-of-bounds Read

<52.2.0esr-1~deb8u1
  • H
Out-of-Bounds

<52.2.0esr-1~deb8u1
  • C
Out-of-Bounds

<45.9.0esr-1~deb8u1
  • C
Use After Free

<45.9.0esr-1~deb8u1
  • C
Use After Free

<52.2.0esr-1~deb8u1
  • C
Use After Free

<52.2.0esr-1~deb8u1
  • C
Use After Free

<52.3.0esr-1~deb8u2
  • C
Out-of-Bounds

<52.4.0esr-1~deb8u1
  • C
Use After Free

<45.6.0esr-1~deb8u1
  • C
Use After Free

<45.8.0esr-1~deb8u1
  • H
Information Exposure

<52.5.2esr-1~deb8u1
  • H
Out-of-bounds Write

<52.7.1esr-1~deb8u1
  • C
Use After Free

<45.9.0esr-1~deb8u1
  • C
Out-of-Bounds

<52.3.0esr-1~deb8u2
  • M
Improper Input Validation

<52.2.0esr-1~deb8u1
  • C
Out-of-Bounds

<45.5.0esr-1~deb8u1
  • C
Use After Free

<52.6.0esr-1~deb8u1
  • M
Information Exposure

<45.8.0esr-1~deb8u1
  • H
Use After Free

<52.4.0esr-1~deb8u1
  • H
Out-of-Bounds

<45.6.0esr-1~deb8u1
  • C
Use After Free

<45.8.0esr-1~deb8u1
  • H
Out-of-Bounds

<45.5.0esr-1~deb8u1
  • H
Arbitrary Code Injection

<52.8.0esr-1~deb8u1
  • C
Out-of-Bounds

<45.9.0esr-1~deb8u1
  • C
Use After Free

<52.4.0esr-1~deb8u1
  • C
Out-of-bounds Read

<45.9.0esr-1~deb8u1
  • M
Information Exposure

<45.5.0esr-1~deb8u1
  • C
Use After Free

<45.9.0esr-1~deb8u1
  • M
Improper Input Validation

<52.3.0esr-1~deb8u2
  • C
Use After Free

<52.6.0esr-1~deb8u1
  • C
Use After Free

<52.8.0esr-1~deb8u1
  • C
Use After Free

<52.6.0esr-1~deb8u1
  • H
Information Exposure

<52.8.0esr-1~deb8u1
  • H
Out-of-Bounds

<45.9.0esr-1~deb8u1
  • C
Out-of-bounds Write

<45.9.0esr-1~deb8u1
  • C
Use After Free

<52.3.0esr-1~deb8u2
  • C
Out-of-Bounds

<52.3.0esr-1~deb8u2
  • C
Out-of-bounds Write

<52.8.0esr-1~deb8u1
  • H
Arbitrary Code Injection

<52.3.0esr-1~deb8u2
  • C
Out-of-Bounds

<45.8.0esr-1~deb8u1
  • H
Origin Validation Error

<45.6.0esr-1~deb8u1
  • H
Out-of-bounds Write

<45.9.0esr-1~deb8u1
  • C
Use After Free

<45.7.0esr-1~deb8u1
  • C
Out-of-bounds Read

<52.3.0esr-1~deb8u2
  • C
Use After Free

<52.2.0esr-1~deb8u1
  • H
Use After Free

<52.2.0esr-1~deb8u1
  • H
Out-of-Bounds

<52.7.1esr-1~deb8u1
  • H
Improper Access Control

<45.6.0esr-1~deb8u1
  • C
Error Handling

<45.8.0esr-1~deb8u1
  • M
Information Exposure

<45.8.0esr-1~deb8u1
  • C
Use After Free

<52.2.0esr-1~deb8u1
  • C
Use After Free

<45.9.0esr-1~deb8u1
  • C
Out-of-Bounds

<45.7.0esr-1~deb8u1
  • H
Improper Privilege Management

<52.3.0esr-1~deb8u2
  • C
Use After Free

<52.6.0esr-1~deb8u1
  • C
Improper Input Validation

<45.6.0esr-1~deb8u1
  • C
Use After Free

<52.6.0esr-1~deb8u1
  • C
Out-of-Bounds

<45.7.0esr-1~deb8u1
  • C
Out-of-Bounds

<45.6.0esr-1~deb8u1
  • C
Out-of-Bounds

<52.3.0esr-1~deb8u2
  • C
Out-of-Bounds

<52.8.0esr-1~deb8u1
  • C
Out-of-Bounds

<45.8.0esr-1~deb8u1
  • C
Out-of-Bounds

<52.8.0esr-1~deb8u1
  • C
Out-of-Bounds

<52.6.0esr-1~deb8u1
  • C
Use After Free

<52.6.0esr-1~deb8u1
  • C
Use After Free

<45.9.0esr-1~deb8u1
  • C
Use After Free

<52.3.0esr-1~deb8u2
  • M
Improper Input Validation

<45.7.0esr-1~deb8u1
  • C
CVE-2017-5390

<45.7.0esr-1~deb8u1
  • C
Use After Free

<45.9.0esr-1~deb8u1
  • H
Out-of-bounds Read

<52.2.0esr-1~deb8u1
  • C
Out-of-bounds Read

<52.2.0esr-1~deb8u1
  • C
Use After Free

<52.3.0esr-1~deb8u2
  • H
Out-of-Bounds

<45.5.0esr-1~deb8u1
  • C
Use After Free

<45.6.0esr-1~deb8u1
  • C
Use After Free

<52.7.3esr-1~deb8u1
  • C
Integer Overflow or Wraparound

<52.6.0esr-1~deb8u1
  • C
Out-of-Bounds

<52.5.0esr-1~deb8u1
  • H
Information Exposure

<52.3.0esr-1~deb8u2
  • M
CVE-2018-5117

<52.6.0esr-1~deb8u1
  • H
Out-of-bounds Write

<45.9.0esr-1~deb8u1
  • H
Improper Input Validation

<52.3.0esr-1~deb8u2
  • C
Out-of-Bounds

<52.4.0esr-1~deb8u1
  • C
Use After Free

<45.7.0esr-1~deb8u1
  • C
Out-of-bounds Write

<52.7.2esr-1~deb8u1
  • C
Use After Free

<45.9.0esr-1~deb8u1
  • C
Use After Free

<52.6.0esr-1~deb8u1
  • C
Use After Free

<52.4.0esr-1~deb8u1
  • C
Use After Free

<52.3.0esr-1~deb8u2
  • M
Information Exposure

<52.7.1esr-1~deb8u1
  • H
Improper Input Validation

<52.7.1esr-1~deb8u1
  • C
Use After Free

<45.9.0esr-1~deb8u1
  • H
Out-of-Bounds

<52.8.0esr-1~deb8u1
  • C
Out-of-Bounds

<45.8.0esr-1~deb8u1
  • C
Integer Overflow or Wraparound

<45.5.0esr-1~deb8u1
  • C
Use After Free

<52.4.0esr-1~deb8u1
  • C
Use After Free

<52.8.0esr-1~deb8u1
  • M
Improper Input Validation

<45.5.0esr-1~deb8u1
  • C
Use After Free

<45.9.0esr-1~deb8u1
  • M
DEPRECATED: Use of Uninitialized Resource

<45.8.0esr-1~deb8u1
  • H
Information Exposure

<45.6.0esr-1~deb8u1
  • M
Cross-site Scripting (XSS)

<52.4.0esr-1~deb8u1
  • C
Out-of-Bounds

<45.9.0esr-1~deb8u1
  • C
Out-of-Bounds

<52.7.1esr-1~deb8u1
  • M
CVE-2018-5168

<52.8.0esr-1~deb8u1
  • C
Use After Free

<45.7.0esr-1~deb8u1
  • H
Information Exposure

<45.7.0esr-1~deb8u1
  • C
Out-of-Bounds

<52.2.0esr-1~deb8u1
  • H
Out-of-Bounds

<52.7.1esr-1~deb8u1
  • H
Security Features

<45.6.0esr-1~deb8u1
  • H
Out-of-bounds Write

<52.7.2esr-1~deb8u1
  • C
Use After Free

<52.2.0esr-1~deb8u1
  • H
CVE-2017-5386

<45.7.0esr-1~deb8u1
  • H
Integer Overflow or Wraparound

<52.7.1esr-1~deb8u1
  • C
Use After Free

<52.6.0esr-1~deb8u1
  • C
Out-of-Bounds

<52.3.0esr-1~deb8u2
  • C
Use After Free

<52.5.0esr-1~deb8u1
  • H
Improper Validation of Array Index

<45.9.0esr-1~deb8u1
  • C
Out-of-Bounds

<45.9.0esr-1~deb8u1
  • H
Use After Free

<45.5.1esr-1~deb8u1
  • C
Use After Free

<45.9.0esr-1~deb8u1
  • M
Improper Certificate Validation

<45.5.0esr-1~deb8u1
  • M
Security Features

<45.6.0esr-1~deb8u1
  • C
Out-of-Bounds

<52.2.0esr-1~deb8u1
  • M
Incorrect Calculation

<45.9.0esr-1~deb8u1
  • H
Improper Input Validation

<52.4.0esr-1~deb8u1
  • M
CVE-2017-7830

<52.5.0esr-1~deb8u1
  • C
Use After Free

<52.2.0esr-1~deb8u1
  • C
Use After Free

<45.9.0esr-1~deb8u1
  • C
Out-of-bounds Read

<45.9.0esr-1~deb8u1
  • M
Information Exposure

<60.2.0esr-1
  • C
Out-of-bounds Write

<45.9.0esr-1~deb8u1
  • C
Use After Free

<45.4.0esr-1~deb8u2
  • H
Out-of-Bounds

<45.4.0esr-1~deb8u2
  • H
Improper Input Validation

<45.4.0esr-1~deb8u2
  • C
Use After Free

<45.4.0esr-1~deb8u2
  • C
Out-of-Bounds

<45.4.0esr-1~deb8u2
  • C
Out-of-Bounds

<45.4.0esr-1~deb8u2
  • C
Use After Free

<45.4.0esr-1~deb8u2
  • C
Use After Free

<45.4.0esr-1~deb8u2
  • H
Improper Input Validation

<45.4.0esr-1~deb8u2
  • C
Use After Free

<45.4.0esr-1~deb8u2
  • H
Integer Overflow or Wraparound

<45.0esr-1
  • H
Out-of-Bounds

<45.3.0esr-1~deb8u1
  • M
Out-of-Bounds

<45.3.0esr-1~deb8u1
  • C
Use After Free

<45.3.0esr-1~deb8u1
  • M
Information Exposure

<45.3.0esr-1~deb8u1
  • M
Information Exposure

<45.4.0esr-1~deb8u2
  • H
Incorrect Type Conversion or Cast

<45.3.0esr-1~deb8u1
  • H
Integer Overflow or Wraparound

<45.4.0esr-1~deb8u2
  • M
Cross-site Scripting (XSS)

<45.3.0esr-1~deb8u1
  • H
Use After Free

<45.3.0esr-1~deb8u1
  • H
Out-of-Bounds

<45.3.0esr-1~deb8u1
  • H
Use After Free

<45.3.0esr-1~deb8u1
  • H
Use After Free

<45.3.0esr-1~deb8u1
  • H
Out-of-Bounds

<45.3.0esr-1~deb8u1
  • M
Cross-site Scripting (XSS)

<45.3.0esr-1~deb8u1
  • M
Improper Access Control

<45.2.0esr-1~deb8u1
  • H
Security Features

<45.2.0esr-1~deb8u1
  • H
Out-of-Bounds

<45.2.0esr-1~deb8u1
  • H
CVE-2016-2828

<45.2.0esr-1~deb8u1
  • H
Out-of-Bounds

<45.2.0esr-1~deb8u1
  • H
CVE-2016-2821

<45.2.0esr-1~deb8u1
  • H
Out-of-Bounds

<45.1.0esr-1
  • H
Out-of-Bounds

<45.1.0esr-1
  • H
Out-of-Bounds

<45.1.0esr-1
  • H
Out-of-Bounds

<45.1.0esr-1
  • H
Out-of-Bounds

<45.0esr-1
  • H
CVE-2016-1966

<45.0esr-1
  • M
Security Features

<45.0esr-1
  • H
Access Restriction Bypass

<45.0esr-1
  • H
Improper Data Handling

<45.0esr-1
  • H
Out-of-Bounds

<45.0esr-1
  • M
Information Exposure

<45.0esr-1
  • H
Numeric Errors

<45.0esr-1
  • H
Out-of-Bounds

<45.0esr-1
  • C
CVE-2016-1962

<45.0esr-1
  • H
Improper Data Handling

<45.0esr-1
  • H
Out-of-Bounds

<45.0esr-1
  • H
Out-of-Bounds

<45.0esr-1
  • H
CVE-2016-1979

<45.0esr-1
  • H
Out-of-Bounds

<45.0esr-1
  • H
Out-of-Bounds

<45.0esr-1
  • M
Information Exposure

<45.0esr-1
  • H
Out-of-Bounds

<45.0esr-1
  • H
Out-of-Bounds

<45.0esr-1
  • M
Security Features

<45.0esr-1
  • H
CVE-2016-1960

<45.0esr-1
  • H
Out-of-Bounds

<45.0esr-1
  • H
Out-of-Bounds

<45.0esr-1
  • H
Out-of-Bounds

<45.0esr-1
  • H
Out-of-Bounds

<45.0esr-1
  • H
Out-of-Bounds

<45.0esr-1
  • H
CVE-2016-1961

<45.0esr-1
  • M
Resource Management Errors

<45.0esr-1
  • H
Out-of-Bounds

<45.0esr-1
  • H
Out-of-Bounds

<45.0esr-1
  • H
Out-of-Bounds

<45.0esr-1
  • H
Out-of-Bounds

<45.0esr-1
  • H
CVE-2016-1964

<45.0esr-1
  • M
Out-of-Bounds

<45.0esr-1
  • H
CVE-2016-1973

<45.0esr-1
  • H
Access Restriction Bypass

<45.0esr-1
  • H
Access Restriction Bypass

<45.0esr-1
  • M
CVE-2007-0801

<45.0esr-1
  • H
Arbitrary Code Injection

<45.0esr-1
  • M
CVE-2006-6499

<45.0esr-1
  • M
CVE-2006-6497

<45.0esr-1
  • M
Access Restriction Bypass

<45.0esr-1
  • M
CVE-2006-6502

<45.0esr-1
  • M
Security Features

<45.0esr-1
  • M
CVE-2006-6498

<45.0esr-1
  • M
CVE-2006-6585

<45.0esr-1
  • H
CVE-2006-5463

<45.0esr-1
  • M
CVE-2006-5748

<45.0esr-1
  • H
CVE-2006-5747

<45.0esr-1
  • M
CVE-2006-5462

<45.0esr-1
  • M
CVE-2006-5464

<45.0esr-1
  • M
CVE-2006-5633

<45.0esr-1
  • M
Improper Input Validation

<45.0esr-1
  • M
CVE-2006-2723

<45.0esr-1