Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-1934— Unexpected GC during RegExp bailout processing

EPSS 0.34% · P57
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-1934

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Unexpected GC during RegExp bailout processing
Source: NVD (National Vulnerability Database)
Vulnerability Description
It was possible to interrupt the processing of a RegExp bailout and run additional JavaScript, potentially triggering garbage collection when the engine was not expecting it. This vulnerability was fixed in Firefox 136, Firefox ESR 128.8, Thunderbird 136, and Thunderbird 128.8.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Mozilla多款产品 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Mozilla Firefox等都是美国Mozilla基金会的产品。Mozilla Firefox是一款开源Web浏览器。Mozilla Firefox ESR是Firefox(Web浏览器)的一个延长支持版本。Mozilla Thunderbird是一套从Mozilla Application Suite独立出来的电子邮件客户端软件。 Mozilla多款产品存在安全漏洞,该漏洞源于垃圾回收触发异常。以下产品及版本受到影响:Firefox 136之前版本、Firefox ESR 128.8之前版本、Thu
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
MozillaFirefox 128.8 ~ 128.* -
MozillaThunderbird 128.8 ~ 128.* -

II. Public POCs for CVE-2025-1934

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-1934

登录查看更多情报信息。

Same Patch Batch · Mozilla · 2025-03-04 · 17 CVEs total

CVE-2025-27425QR code user confirmation bypass with invalid protocol
CVE-2025-27426Firefox Mobile iOS Full Address Bar Spoof Using Server-Side Redirect to internal error pag
CVE-2025-27424Firefox Mobile iOS Address Bar Spoof Using Server-Side Redirect to non-http Scheme
CVE-2025-1943Memory safety bugs fixed in Firefox 136 and Thunderbird 136
CVE-2025-1937Memory safety bugs fixed in Firefox 136, Thunderbird 136, Firefox ESR 115.21, Firefox ESR
CVE-2025-1938Memory safety bugs fixed in Firefox 136, Thunderbird 136, Firefox ESR 128.8, and Thunderbi
CVE-2025-1935Clickjacking the registerProtocolHandler info-bar
CVE-2025-1942Disclosure of uninitialized memory when .toUpperCase() causes string to get longer
CVE-2025-1936Adding %00 and a fake extension to a jar: URL changed the interpretation of the contents
CVE-2025-1941Lock screen setting bypass in Firefox Focus for Android
CVE-2025-1932Inconsistent comparator in XSLT sorting led to out-of-bounds access
CVE-2025-1940Android Intent confirmation prompt tapjacking using Select options
CVE-2025-1933JIT corruption of WASM i32 return values on 64-bit CPUs
CVE-2025-1931Use-after-free in WebTransportChild
CVE-2025-1939Tapjacking in Android Custom Tabs using transition animations
CVE-2025-1930AudioIPC StreamData could trigger a use-after-free in the Browser process

IV. Related Vulnerabilities

V. Comments for CVE-2025-1934

No comments yet


Leave a comment