Vulnerabilities > Mozilla > Thunderbird
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-10-01 | CVE-2020-15678 | Use After Free vulnerability in multiple products When recursing through graphical layers while scrolling, an iterator may have become invalid, resulting in a potential use-after-free. | 8.8 |
2020-10-01 | CVE-2020-15677 | Open Redirect vulnerability in multiple products By exploiting an Open Redirect vulnerability on a website, an attacker could have spoofed the site displayed in the download file dialog to show the original site (the one suffering from the open redirect) rather than the site the file was actually downloaded from. | 6.1 |
2020-10-01 | CVE-2020-15676 | Cross-site Scripting vulnerability in multiple products Firefox sometimes ran the onload handler for SVG elements that the DOM sanitizer decided to remove, resulting in JavaScript being executed after pasting attacker-controlled data into a contenteditable element. | 6.1 |
2020-10-01 | CVE-2020-15673 | Use After Free vulnerability in multiple products Mozilla developers reported memory safety bugs present in Firefox 80 and Firefox ESR 78.2. | 8.8 |
2020-08-10 | CVE-2020-15659 | Out-of-bounds Write vulnerability in multiple products Mozilla developers and community members reported memory safety bugs present in Firefox 78 and Firefox ESR 78.0. | 8.8 |
2020-08-10 | CVE-2020-15658 | Improper Check for Unusual or Exceptional Conditions vulnerability in multiple products The code for downloading files did not properly take care of special characters, which led to an attacker being able to cut off the file ending at an earlier position, leading to a different file type being downloaded than shown in the dialog. | 6.5 |
2020-08-10 | CVE-2020-15657 | Uncontrolled Search Path Element vulnerability in Mozilla Firefox Firefox could be made to load attacker-supplied DLL files from the installation directory. | 7.8 |
2020-08-10 | CVE-2020-15656 | Type Confusion vulnerability in multiple products JIT optimizations involving the Javascript arguments object could confuse later optimizations. | 8.8 |
2020-08-10 | CVE-2020-15655 | A redirected HTTP request which is observed or modified through a web extension could bypass existing CORS checks, leading to potential disclosure of cross-origin information. | 6.5 |
2020-08-10 | CVE-2020-15654 | Infinite Loop vulnerability in multiple products When in an endless loop, a website specifying a custom cursor using CSS could make it look like the user is interacting with the user interface, when they are not. | 6.5 |