CVE-2020-15653
- EPSS 0.28%
- Veröffentlicht 10.08.2020 18:15:12
- Zuletzt bearbeitet 21.11.2024 05:05:57
An iframe sandbox element with the allow-popups flag could be bypassed when using noopener links. This could have led to security issues for websites relying on sandbox configurations that allowed popups and hosted arbitrary content. This vulnerabili...
CVE-2020-15654
- EPSS 0.46%
- Veröffentlicht 10.08.2020 18:15:12
- Zuletzt bearbeitet 21.11.2024 05:05:57
When in an endless loop, a website specifying a custom cursor using CSS could make it look like the user is interacting with the user interface, when they are not. This could lead to a perceived broken state, especially when interactions with existin...
CVE-2020-15655
- EPSS 0.23%
- Veröffentlicht 10.08.2020 18:15:12
- Zuletzt bearbeitet 21.11.2024 05:05:57
A redirected HTTP request which is observed or modified through a web extension could bypass existing CORS checks, leading to potential disclosure of cross-origin information. This vulnerability affects Firefox ESR < 78.1, Firefox < 79, and Thunderbi...
CVE-2020-15656
- EPSS 0.84%
- Veröffentlicht 10.08.2020 18:15:12
- Zuletzt bearbeitet 21.11.2024 05:05:57
JIT optimizations involving the Javascript arguments object could confuse later optimizations. This risk was already mitigated by various precautions in the code, resulting in this bug rated at only moderate severity. This vulnerability affects Firef...
CVE-2020-15658
- EPSS 0.49%
- Veröffentlicht 10.08.2020 18:15:12
- Zuletzt bearbeitet 21.11.2024 05:05:57
The code for downloading files did not properly take care of special characters, which led to an attacker being able to cut off the file ending at an earlier position, leading to a different file type being downloaded than shown in the dialog. This v...
CVE-2020-15659
- EPSS 0.93%
- Veröffentlicht 10.08.2020 18:15:12
- Zuletzt bearbeitet 21.11.2024 05:05:57
Mozilla developers and community members reported memory safety bugs present in Firefox 78 and Firefox ESR 78.0. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to...
CVE-2020-9490
- EPSS 75.82%
- Veröffentlicht 07.08.2020 16:15:12
- Zuletzt bearbeitet 21.11.2024 05:40:45
Apache HTTP Server versions 2.4.20 to 2.4.43. A specially crafted value for the 'Cache-Digest' header in a HTTP/2 request would result in a crash when the server actually tries to HTTP/2 PUSH a resource afterwards. Configuring the HTTP/2 feature via ...
CVE-2020-11984
- EPSS 75.35%
- Veröffentlicht 07.08.2020 16:15:11
- Zuletzt bearbeitet 21.11.2024 04:59:02
Apache HTTP server 2.4.32 to 2.4.44 mod_proxy_uwsgi info disclosure and possible RCE
CVE-2020-11993
- EPSS 38.85%
- Veröffentlicht 07.08.2020 16:15:11
- Zuletzt bearbeitet 01.05.2025 15:40:19
Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns, logging statements were made on the wrong connection, causing concurrent use of memory pools. Configuring the LogLev...
CVE-2020-15701
- EPSS 0.12%
- Veröffentlicht 06.08.2020 23:15:11
- Zuletzt bearbeitet 21.11.2024 05:06:02
An unhandled exception in check_ignored() in apport/report.py can be exploited by a local attacker to cause a denial of service. If the mtime attribute is a string value in apport-ignore.xml, it will trigger an unhandled exception, resulting in a cra...