Vulnerabilities > Mozilla > Firefox ESR
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-04-24 | CVE-2020-6828 | Path Traversal vulnerability in Mozilla Firefox ESR A malicious Android application could craft an Intent that would have been processed by Firefox for Android and potentially result in a file overwrite in the user's profile directory. | 7.5 |
2020-04-24 | CVE-2020-6827 | Improper Restriction of Rendered UI Layers or Frames vulnerability in Mozilla Firefox ESR When following a link that opened an intent://-schemed URL, causing a custom tab to be opened, Firefox for Android could be tricked into displaying the incorrect URI. | 4.7 |
2020-04-24 | CVE-2020-6825 | Out-of-bounds Write vulnerability in Mozilla Firefox Mozilla developers and community members Tyson Smith and Christian Holler reported memory safety bugs present in Firefox 74 and Firefox ESR 68.6. | 9.8 |
2020-04-24 | CVE-2020-6822 | Out-of-bounds Write vulnerability in Mozilla Firefox On 32-bit builds, an out of bounds write could have occurred when processing an image larger than 4 GB in <code>GMPDecodeData</code>. | 8.8 |
2020-04-24 | CVE-2020-6821 | Use of Uninitialized Resource vulnerability in Mozilla Firefox When reading from areas partially or fully outside the source resource with WebGL's <code>copyTexSubImage</code> method, the specification requires the returned values be zero. | 7.5 |
2020-04-24 | CVE-2020-6820 | Race Condition vulnerability in Mozilla Thunderbird Under certain conditions, when handling a ReadableStream, a race condition can cause a use-after-free. | 8.1 |
2020-04-24 | CVE-2020-6819 | Use After Free vulnerability in Mozilla Thunderbird Under certain conditions, when running the nsDocShell destructor, a race condition can cause a use-after-free. | 8.1 |
2020-03-25 | CVE-2020-6814 | Out-of-bounds Write vulnerability in multiple products Mozilla developers reported memory safety bugs present in Firefox and Thunderbird 68.5. | 9.8 |
2020-03-25 | CVE-2020-6812 | Information Exposure vulnerability in multiple products The first time AirPods are connected to an iPhone, they become named after the user's name by default (e.g. | 5.3 |
2020-03-25 | CVE-2020-6811 | Command Injection vulnerability in multiple products The 'Copy as cURL' feature of Devtools' network tab did not properly escape the HTTP method of a request, which can be controlled by the website. | 8.8 |