CVE-2021-23953
- EPSS 0.38%
- Veröffentlicht 26.02.2021 03:15:13
- Zuletzt bearbeitet 21.11.2024 05:52:05
If a user clicked into a specifically crafted PDF, the PDF reader could be confused into leaking cross-origin information, when said information is served as chunked data. This vulnerability affects Firefox < 85, Thunderbird < 78.7, and Firefox ESR <...
CVE-2021-23954
- EPSS 0.39%
- Veröffentlicht 26.02.2021 03:15:13
- Zuletzt bearbeitet 21.11.2024 05:52:05
Using the new logical assignment operators in a JavaScript switch statement could have caused a type confusion, leading to a memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 85, Thunderbird < 78.7, and Firef...
CVE-2021-23960
- EPSS 0.53%
- Veröffentlicht 26.02.2021 03:15:13
- Zuletzt bearbeitet 21.11.2024 05:52:06
Performing garbage collection on re-declared JavaScript variables resulted in a user-after-poison, and a potentially exploitable crash. This vulnerability affects Firefox < 85, Thunderbird < 78.7, and Firefox ESR < 78.7.
CVE-2021-23973
- EPSS 0.72%
- Veröffentlicht 26.02.2021 02:15:13
- Zuletzt bearbeitet 21.11.2024 05:52:07
When trying to load a cross-origin resource in an audio/video context a decoding error may have resulted, and the content of that error may have revealed information about the resource. This vulnerability affects Firefox < 86, Thunderbird < 78.8, and...
CVE-2021-23968
- EPSS 0.36%
- Veröffentlicht 26.02.2021 02:15:12
- Zuletzt bearbeitet 21.11.2024 05:52:07
If Content Security Policy blocked frame navigation, the full destination of a redirect served in the frame was reported in the violation report; as opposed to the original frame URI. This could be used to leak sensitive information contained in such...
CVE-2021-23969
- EPSS 1.02%
- Veröffentlicht 26.02.2021 02:15:12
- Zuletzt bearbeitet 21.11.2024 05:52:07
As specified in the W3C Content Security Policy draft, when creating a violation report, "User agents need to ensure that the source file is the URL requested by the page, pre-redirects. If that’s not possible, user agents need to strip the URL down ...
CVE-2020-26974
- EPSS 0.76%
- Veröffentlicht 07.01.2021 14:15:12
- Zuletzt bearbeitet 21.11.2024 05:20:36
When flex-basis was used on a table wrapper, a StyleGenericFlexBasis object could have been incorrectly cast to the wrong type. This resulted in a heap user-after-free, memory corruption, and a potentially exploitable crash. This vulnerability affect...
CVE-2020-26978
- EPSS 0.42%
- Veröffentlicht 07.01.2021 14:15:12
- Zuletzt bearbeitet 21.11.2024 05:20:36
Using techniques that built on the slipstream research, a malicious webpage could have exposed both an internal network's hosts as well as services running on the user's local machine. This vulnerability affects Firefox < 84, Thunderbird < 78.6, and ...
CVE-2020-35111
- EPSS 0.32%
- Veröffentlicht 07.01.2021 14:15:12
- Zuletzt bearbeitet 21.11.2024 05:26:47
When an extension with the proxy permission registered to receive <all_urls>, the proxy.onRequest callback was not triggered for view-source URLs. While web content cannot navigate to such URLs, a user opening View Source could have inadvertently lea...
CVE-2020-35112
- EPSS 0.53%
- Veröffentlicht 07.01.2021 14:15:12
- Zuletzt bearbeitet 21.11.2024 05:26:47
If a user downloaded a file lacking an extension on Windows, and then "Open"-ed it from the downloads panel, if there was an executable file in the downloads directory with the same name but with an executable extension (such as .bat or .exe) that ex...