CVE-2021-43537
- EPSS 0.53%
- Veröffentlicht 08.12.2021 22:15:09
- Zuletzt bearbeitet 21.11.2024 06:29:22
An incorrect type conversion of sizes from 64bit to 32bit integers allowed an attacker to corrupt memory leading to a potentially exploitable crash. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.
CVE-2021-43538
- EPSS 0.25%
- Veröffentlicht 08.12.2021 22:15:09
- Zuletzt bearbeitet 21.11.2024 06:29:23
By misusing a race in our notification code, an attacker could have forcefully hidden the notification for pages that had received full screen and pointer lock access, which could have been used for spoofing attacks. This vulnerability affects Thunde...
CVE-2021-43539
- EPSS 0.64%
- Veröffentlicht 08.12.2021 22:15:09
- Zuletzt bearbeitet 21.11.2024 06:29:23
Failure to correctly record the location of live pointers across wasm instance calls resulted in a GC occurring within the call not tracing those live pointers. This could have led to a use-after-free causing a potentially exploitable crash. This vul...
CVE-2021-43540
- EPSS 0.32%
- Veröffentlicht 08.12.2021 22:15:09
- Zuletzt bearbeitet 21.11.2024 06:29:23
WebExtensions with the correct permissions were able to create and install ServiceWorkers for third-party websites that would not have been uninstalled with the extension. This vulnerability affects Firefox < 95.
CVE-2021-43541
- EPSS 0.31%
- Veröffentlicht 08.12.2021 22:15:09
- Zuletzt bearbeitet 21.11.2024 06:29:23
When invoking protocol handlers for external protocols, a supplied parameter URL containing spaces was not properly escaped. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.
CVE-2021-43542
- EPSS 0.48%
- Veröffentlicht 08.12.2021 22:15:09
- Zuletzt bearbeitet 21.11.2024 06:29:23
Using XMLHttpRequest, an attacker could have identified installed applications by probing error messages for loading external protocols. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.
CVE-2021-43543
- EPSS 0.45%
- Veröffentlicht 08.12.2021 22:15:09
- Zuletzt bearbeitet 21.11.2024 06:29:23
Documents loaded with the CSP sandbox directive could have escaped the sandbox's script restriction by embedding additional content. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.
CVE-2021-43544
- EPSS 0.38%
- Veröffentlicht 08.12.2021 22:15:09
- Zuletzt bearbeitet 21.11.2024 06:29:23
When receiving a URL through a SEND intent, Firefox would have searched for the text, but subsequent usages of the address bar might have caused the URL to load unintentionally, which could lead to XSS and spoofing attacks. *This bug only affects Fir...
- EPSS 1.48%
- Veröffentlicht 08.12.2021 22:15:08
- Zuletzt bearbeitet 21.11.2024 06:17:15
The iframe sandbox rules were not correctly applied to XSLT stylesheets, allowing an iframe to bypass restrictions such as executing scripts or navigating the top-level frame. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox E...
CVE-2021-38504
- EPSS 0.52%
- Veröffentlicht 08.12.2021 22:15:08
- Zuletzt bearbeitet 21.11.2024 06:17:15
When interacting with an HTML input element's file picker dialog with webkitdirectory set, a use-after-free could have resulted, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 94, Thunderbird < ...