CVE-2020-26951
- EPSS 0.43%
- Veröffentlicht 09.12.2020 01:15:12
- Zuletzt bearbeitet 21.11.2024 05:20:33
A parsing and event loading mismatch in Firefox's SVG code could have allowed load events to fire, even after sanitization. An attacker already capable of exploiting an XSS vulnerability in privileged internal pages could have used this attack to byp...
CVE-2020-26952
- EPSS 0.42%
- Veröffentlicht 09.12.2020 01:15:12
- Zuletzt bearbeitet 21.11.2024 05:20:34
Incorrect bookkeeping of functions inlined during JIT compilation could have led to memory corruption and a potentially exploitable crash when handling out-of-memory errors. This vulnerability affects Firefox < 83.
CVE-2020-26953
- EPSS 0.23%
- Veröffentlicht 09.12.2020 01:15:12
- Zuletzt bearbeitet 21.11.2024 05:20:34
It was possible to cause the browser to enter fullscreen mode without displaying the security UI; thus making it possible to attempt a phishing attack or otherwise confuse the user. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thu...
CVE-2020-26954
- EPSS 0.29%
- Veröffentlicht 09.12.2020 01:15:12
- Zuletzt bearbeitet 21.11.2024 05:20:34
When accepting a malicious intent from other installed apps, Firefox for Android accepted manifests from arbitrary file paths and allowed declaring webapp manifests for other origins. This could be used to gain fullscreen access for UI spoofing and c...
CVE-2020-26955
- EPSS 0.28%
- Veröffentlicht 09.12.2020 01:15:12
- Zuletzt bearbeitet 21.11.2024 05:20:34
When a user downloaded a file in Firefox for Android, if a cookie is set, it would have been re-sent during a subsequent file download operation on the same domain, regardless of whether the original and subsequent request were in private and non-pri...
CVE-2020-26956
- EPSS 0.43%
- Veröffentlicht 09.12.2020 01:15:12
- Zuletzt bearbeitet 21.11.2024 05:20:34
In some cases, removing HTML elements during sanitization would keep existing SVG event handlers and therefore lead to XSS. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.
CVE-2020-6829
- EPSS 0.23%
- Veröffentlicht 28.10.2020 12:15:12
- Zuletzt bearbeitet 21.11.2024 05:36:15
When performing EC scalar point multiplication, the wNAF point multiplication algorithm was used; which leaked partial information about the nonce used during signature generation. Given an electro-magnetic trace of a few signature generations, the p...
CVE-2020-15680
- EPSS 0.32%
- Veröffentlicht 22.10.2020 21:15:13
- Zuletzt bearbeitet 21.11.2024 05:06:00
If a valid external protocol handler was referenced in an image tag, the resulting broken image size could be distinguished from a broken image size of a non-existent protocol handler. This allowed an attacker to successfully probe whether an externa...
CVE-2020-15681
- EPSS 0.43%
- Veröffentlicht 22.10.2020 21:15:13
- Zuletzt bearbeitet 21.11.2024 05:06:00
When multiple WASM threads had a reference to a module, and were looking up exported functions, one WASM thread could have overwritten another's entry in a shared stub table, resulting in a potentially exploitable crash. This vulnerability affects Fi...
CVE-2020-15682
- EPSS 0.13%
- Veröffentlicht 22.10.2020 21:15:13
- Zuletzt bearbeitet 21.11.2024 05:06:00
When a link to an external protocol was clicked, a prompt was presented that allowed the user to choose what application to open it in. An attacker could induce that prompt to be associated with an origin they didn't control, resulting in a spoofing ...