Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2025-1934

Description

It was possible to interrupt the processing of a RegExp bailout and run additional JavaScript, potentially triggering garbage collection when the engine was not expecting it. This vulnerability affects Firefox < 136, Firefox ESR < 128.8, Thunderbird < 136, and Thunderbird < 128.8.

POC

Reference

No PoCs from references.

Github

- https://github.com/5211-yx/javascript_fuzzer

- https://github.com/ARPSyndicate/cve-scores

- https://github.com/fkie-cad/nvd-json-data-feeds

- https://github.com/googleprojectzero/fuzzilli

- https://github.com/w4zu/Debian_security