This vulnerability is marked as RESERVED by NVD. This means that the CVE-ID is reserved for future use by the CVE Numbering Authority (CNA) or a security researcher, but the details of it are not yet publicly available yet.
This page will reflect the classification results once they are available through NVD.
Any vendor information available is shown as below.
If a user visited a webpage with an invalid TLS certificate, and granted an exception, the webpage was able to provide a WebAuthn challenge that the user would be prompted to complete. This is in violation of the WebAuthN spec which requires “a secure transport established without errors”. This vulnerability affects Firefox < 140.
Name | Vendor | Version |
---|---|---|
Mozjs102 | Ubuntu/esm-apps/noble | |
Mozjs102 | Ubuntu/jammy | |
Mozjs102 | Ubuntu/noble | |
Mozjs102 | Ubuntu/upstream | TBD |
Mozjs115 | Ubuntu/noble | |
Mozjs115 | Ubuntu/oracular | |
Mozjs115 | Ubuntu/plucky | |
Mozjs115 | Ubuntu/upstream | TBD |
Mozjs115 | Ubuntu/devel | |
Mozjs38 | Ubuntu/upstream | TBD |
Mozjs38 | Ubuntu/esm-apps/bionic | TBD |
Mozjs52 | Ubuntu/upstream | TBD |
Mozjs52 | Ubuntu/esm-apps/focal | |
Mozjs52 | Ubuntu/esm-infra/bionic | |
Firefox | Ubuntu/upstream | TBD |
Mozjs68 | Ubuntu/esm-infra/focal | |
Mozjs68 | Ubuntu/upstream | TBD |
Mozjs78 | Ubuntu/upstream | TBD |
Mozjs78 | Ubuntu/esm-apps/jammy | |
Mozjs78 | Ubuntu/jammy | |
Mozjs91 | Ubuntu/upstream | TBD |
Mozjs91 | Ubuntu/jammy | |
Thunderbird | Ubuntu/upstream | TBD |
Thunderbird | Ubuntu/jammy |