ALT-PU-2014-1391-1
Package thunderbird updated to version 24.3.0-alt0.M70P.1 for branch c7 in task 117167.
Closed vulnerabilities
BDU:2014-00234
Уязвимость браузера Firefox, позволяющая злоумышленнику получить доступ к аутентификационным данным
BDU:2014-00235
Уязвимость браузера Firefox ESR, позволяющая злоумышленнику получить доступ к аутентификационным данным
BDU:2014-00236
Уязвимость почтового клиента Thunderbird, позволяющая злоумышленнику получить доступ к аутентификационным данным
BDU:2014-00237
Уязвимость пакета программ Mozilla SeaMonkey, позволяющая злоумышленнику получить доступ к аутентификационным данным
BDU:2014-00257
Уязвимость браузера Firefox, позволяющая злоумышленнику выполнить произвольный код или вызвать отказ в обслуживании
BDU:2014-00258
Уязвимость браузера Firefox ESR, позволяющая злоумышленнику выполнить произвольный код или вызвать отказ в обслуживании
BDU:2014-00259
Уязвимость почтового клиента Thunderbird позволяющая злоумышленнику выполнить произвольный код или вызвать отказ в обслуживании
BDU:2014-00260
Уязвимость пакета программ Mozilla SeaMonkey, позволяющая злоумышленнику выполнить произвольный код или вызвать отказ в обслуживании
BDU:2014-00265
Уязвимость браузера Firefox, позволяющая злоумышленнику выполнить произвольный код или вызвать отказ в обслуживании
BDU:2014-00266
Уязвимость браузера Firefox ESR, позволяющая злоумышленнику выполнить произвольный код или вызвать отказ в обслуживании
BDU:2014-00267
Уязвимость почтового клиента Thunderbird, позволяющая злоумышленнику выполнить произвольный код или вызвать отказ в обслуживании
BDU:2014-00268
Уязвимость пакета программ Mozilla SeaMonkey, позволяющая злоумышленнику выполнить произвольный код или вызвать отказ в обслуживании
BDU:2014-00286
Уязвимость браузера Firefox, позволяющая злоумышленнику обойти ограничения на оконные объекты
BDU:2014-00287
Уязвимость браузера Firefox ESR, позволяющая злоумышленнику обойти ограничения на оконные объекты
BDU:2014-00288
Уязвимость почтового клиента Thunderbird, позволяющая злоумышленнику обойти ограничения на оконные объекты
BDU:2014-00289
Уязвимость пакета программ Mozilla SeaMonkey, позволяющая злоумышленнику обойти ограничения на оконные объекты
BDU:2014-00294
Уязвимость браузера Firefox, позволяющая злоумышленнику обойти ограничения
BDU:2014-00295
Уязвимость браузера Firefox ESR, позволяющая злоумышленнику обойти ограничения
BDU:2014-00296
Уязвимость почтового клиента Thunderbird, позволяющая злоумышленнику обойти ограничения
BDU:2014-00297
Уязвимость пакета программ Mozilla SeaMonkey, позволяющая злоумышленнику обойти ограничения
BDU:2014-00298
Уязвимость браузера Firefox, позволяющая злоумышленнику выполнить произвольный код или выполнить отказ в обслуживании
BDU:2014-00299
Уязвимость браузера Firefox ESR, позволяющая злоумышленнику выполнить произвольный код или выполнить отказ в обслуживании
BDU:2014-00300
Уязвимость почтового клиента Thunderbird, позволяющая злоумышленнику выполнить произвольный код или выполнить отказ в обслуживании
BDU:2014-00301
Уязвимость пакета программ Mozilla SeaMonkey, позволяющая злоумышленнику выполнить произвольный код или выполнить отказ в обслуживании
BDU:2015-06136
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2015-06137
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2015-06138
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2015-06139
Множественные уязвимости пакета libjpeg-turbo-static-1.2.1 операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2015-07110
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2015-07111
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2015-07112
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2015-09076
Уязвимость операционной системы CentOS, позволяющая удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2015-09077
Уязвимость операционной системы CentOS, позволяющая удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2015-09078
Уязвимость операционной системы CentOS, позволяющая удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2015-09079
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2015-09080
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2015-09081
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2015-09082
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
Modified: 2024-11-21
CVE-2013-2566
The RC4 algorithm, as used in the TLS protocol and SSL protocol, has many single-byte biases, which makes it easier for remote attackers to conduct plaintext-recovery attacks via statistical analysis of ciphertext in a large number of sessions that use the same plaintext.
- http://blog.cryptographyengineering.com/2013/03/attack-of-week-rc4-is-kind-of-broken-in.html
- http://blog.cryptographyengineering.com/2013/03/attack-of-week-rc4-is-kind-of-broken-in.html
- http://cr.yp.to/talks/2013.03.12/slides.pdf
- http://cr.yp.to/talks/2013.03.12/slides.pdf
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- HPSBGN03324
- HPSBGN03324
- SSRT102035
- SSRT102035
- http://my.opera.com/securitygroup/blog/2013/03/20/on-the-precariousness-of-rc4
- http://my.opera.com/securitygroup/blog/2013/03/20/on-the-precariousness-of-rc4
- GLSA-201406-19
- GLSA-201406-19
- http://www.isg.rhul.ac.uk/tls/
- http://www.isg.rhul.ac.uk/tls/
- http://www.mozilla.org/security/announce/2013/mfsa2013-103.html
- http://www.mozilla.org/security/announce/2013/mfsa2013-103.html
- http://www.opera.com/docs/changelogs/unified/1215/
- http://www.opera.com/docs/changelogs/unified/1215/
- http://www.opera.com/security/advisory/1046
- http://www.opera.com/security/advisory/1046
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- 58796
- 58796
- USN-2031-1
- USN-2031-1
- USN-2032-1
- USN-2032-1
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2013-5609
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
- FEDORA-2013-23127
- FEDORA-2013-23127
- FEDORA-2013-23295
- FEDORA-2013-23295
- FEDORA-2013-23519
- FEDORA-2013-23519
- FEDORA-2013-23291
- FEDORA-2013-23291
- SUSE-SU-2013:1919
- SUSE-SU-2013:1919
- openSUSE-SU-2013:1916
- openSUSE-SU-2013:1916
- openSUSE-SU-2013:1917
- openSUSE-SU-2013:1917
- openSUSE-SU-2013:1918
- openSUSE-SU-2013:1918
- openSUSE-SU-2013:1957
- openSUSE-SU-2013:1957
- openSUSE-SU-2013:1958
- openSUSE-SU-2013:1958
- openSUSE-SU-2013:1959
- openSUSE-SU-2013:1959
- openSUSE-SU-2014:0008
- openSUSE-SU-2014:0008
- RHSA-2013:1812
- RHSA-2013:1812
- http://www.mozilla.org/security/announce/2013/mfsa2013-104.html
- http://www.mozilla.org/security/announce/2013/mfsa2013-104.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 1029470
- 1029470
- 1029476
- 1029476
- USN-2052-1
- USN-2052-1
- USN-2053-1
- USN-2053-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=886850
- https://bugzilla.mozilla.org/show_bug.cgi?id=886850
- https://bugzilla.mozilla.org/show_bug.cgi?id=905382
- https://bugzilla.mozilla.org/show_bug.cgi?id=905382
- https://bugzilla.mozilla.org/show_bug.cgi?id=922009
- https://bugzilla.mozilla.org/show_bug.cgi?id=922009
- https://bugzilla.mozilla.org/show_bug.cgi?id=937582
- https://bugzilla.mozilla.org/show_bug.cgi?id=937582
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2013-5613
Use-after-free vulnerability in the PresShell::DispatchSynthMouseMove function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving synthetic mouse movement, related to the RestyleManager::GetHoverGeneration function.
- FEDORA-2013-23127
- FEDORA-2013-23127
- FEDORA-2013-23295
- FEDORA-2013-23295
- FEDORA-2013-23519
- FEDORA-2013-23519
- FEDORA-2013-23291
- FEDORA-2013-23291
- SUSE-SU-2013:1919
- SUSE-SU-2013:1919
- openSUSE-SU-2013:1916
- openSUSE-SU-2013:1916
- openSUSE-SU-2013:1917
- openSUSE-SU-2013:1917
- openSUSE-SU-2013:1918
- openSUSE-SU-2013:1918
- openSUSE-SU-2013:1957
- openSUSE-SU-2013:1957
- openSUSE-SU-2013:1958
- openSUSE-SU-2013:1958
- openSUSE-SU-2013:1959
- openSUSE-SU-2013:1959
- openSUSE-SU-2014:0008
- openSUSE-SU-2014:0008
- RHSA-2013:1812
- RHSA-2013:1812
- http://www.mozilla.org/security/announce/2013/mfsa2013-114.html
- http://www.mozilla.org/security/announce/2013/mfsa2013-114.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 1029470
- 1029470
- 1029476
- 1029476
- USN-2052-1
- USN-2052-1
- USN-2053-1
- USN-2053-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=930381
- https://bugzilla.mozilla.org/show_bug.cgi?id=930381
- https://bugzilla.mozilla.org/show_bug.cgi?id=932449
- https://bugzilla.mozilla.org/show_bug.cgi?id=932449
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2013-5615
The JavaScript implementation in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 does not properly enforce certain typeset restrictions on the generation of GetElementIC typed array stubs, which has unspecified impact and remote attack vectors.
- FEDORA-2013-23127
- FEDORA-2013-23127
- FEDORA-2013-23295
- FEDORA-2013-23295
- FEDORA-2013-23519
- FEDORA-2013-23519
- FEDORA-2013-23291
- FEDORA-2013-23291
- SUSE-SU-2013:1919
- SUSE-SU-2013:1919
- openSUSE-SU-2013:1916
- openSUSE-SU-2013:1916
- openSUSE-SU-2013:1917
- openSUSE-SU-2013:1917
- openSUSE-SU-2013:1918
- openSUSE-SU-2013:1918
- openSUSE-SU-2013:1957
- openSUSE-SU-2013:1957
- openSUSE-SU-2013:1958
- openSUSE-SU-2013:1958
- openSUSE-SU-2013:1959
- openSUSE-SU-2013:1959
- openSUSE-SU-2014:0008
- openSUSE-SU-2014:0008
- http://www.mozilla.org/security/announce/2013/mfsa2013-115.html
- http://www.mozilla.org/security/announce/2013/mfsa2013-115.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 1029470
- 1029470
- 1029476
- 1029476
- USN-2052-1
- USN-2052-1
- USN-2053-1
- USN-2053-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=929261
- https://bugzilla.mozilla.org/show_bug.cgi?id=929261
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2013-5616
Use-after-free vulnerability in the nsEventListenerManager::HandleEventSubType function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors related to mListeners event listeners.
- FEDORA-2013-23127
- FEDORA-2013-23127
- FEDORA-2013-23295
- FEDORA-2013-23295
- FEDORA-2013-23519
- FEDORA-2013-23519
- FEDORA-2013-23291
- FEDORA-2013-23291
- SUSE-SU-2013:1919
- SUSE-SU-2013:1919
- openSUSE-SU-2013:1916
- openSUSE-SU-2013:1916
- openSUSE-SU-2013:1917
- openSUSE-SU-2013:1917
- openSUSE-SU-2013:1918
- openSUSE-SU-2013:1918
- openSUSE-SU-2013:1957
- openSUSE-SU-2013:1957
- openSUSE-SU-2013:1958
- openSUSE-SU-2013:1958
- openSUSE-SU-2013:1959
- openSUSE-SU-2013:1959
- openSUSE-SU-2014:0008
- openSUSE-SU-2014:0008
- RHSA-2013:1812
- RHSA-2013:1812
- http://www.mozilla.org/security/announce/2013/mfsa2013-108.html
- http://www.mozilla.org/security/announce/2013/mfsa2013-108.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 1029470
- 1029470
- 1029476
- 1029476
- USN-2052-1
- USN-2052-1
- USN-2053-1
- USN-2053-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=938341
- https://bugzilla.mozilla.org/show_bug.cgi?id=938341
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2013-5618
Use-after-free vulnerability in the nsNodeUtils::LastRelease function in the table-editing user interface in the editor component in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code by triggering improper garbage collection.
- FEDORA-2013-23127
- FEDORA-2013-23127
- FEDORA-2013-23295
- FEDORA-2013-23295
- FEDORA-2013-23519
- FEDORA-2013-23519
- FEDORA-2013-23291
- FEDORA-2013-23291
- SUSE-SU-2013:1919
- SUSE-SU-2013:1919
- openSUSE-SU-2013:1916
- openSUSE-SU-2013:1916
- openSUSE-SU-2013:1917
- openSUSE-SU-2013:1917
- openSUSE-SU-2013:1918
- openSUSE-SU-2013:1918
- openSUSE-SU-2013:1957
- openSUSE-SU-2013:1957
- openSUSE-SU-2013:1958
- openSUSE-SU-2013:1958
- openSUSE-SU-2013:1959
- openSUSE-SU-2013:1959
- openSUSE-SU-2014:0008
- openSUSE-SU-2014:0008
- RHSA-2013:1812
- RHSA-2013:1812
- http://www.mozilla.org/security/announce/2013/mfsa2013-109.html
- http://www.mozilla.org/security/announce/2013/mfsa2013-109.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 1029470
- 1029470
- 1029476
- 1029476
- USN-2052-1
- USN-2052-1
- USN-2053-1
- USN-2053-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=926361
- https://bugzilla.mozilla.org/show_bug.cgi?id=926361
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2013-6629
The get_sos function in jdmarker.c in (1) libjpeg 6b and (2) libjpeg-turbo through 1.3.0, as used in Google Chrome before 31.0.1650.48, Ghostscript, and other products, does not check for certain duplications of component data during the reading of segments that follow Start Of Scan (SOS) JPEG markers, which allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted JPEG image.
- http://advisories.mageia.org/MGASA-2013-0333.html
- http://advisories.mageia.org/MGASA-2013-0333.html
- 20131112 bugs in IJG jpeg6b & libjpeg-turbo
- 20131112 bugs in IJG jpeg6b & libjpeg-turbo
- http://bugs.ghostscript.com/show_bug.cgi?id=686980
- http://bugs.ghostscript.com/show_bug.cgi?id=686980
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- FEDORA-2013-23127
- FEDORA-2013-23127
- FEDORA-2013-23295
- FEDORA-2013-23295
- FEDORA-2013-23519
- FEDORA-2013-23519
- FEDORA-2013-23291
- FEDORA-2013-23291
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1916
- openSUSE-SU-2013:1916
- openSUSE-SU-2013:1917
- openSUSE-SU-2013:1917
- openSUSE-SU-2013:1918
- openSUSE-SU-2013:1918
- openSUSE-SU-2013:1957
- openSUSE-SU-2013:1957
- openSUSE-SU-2013:1958
- openSUSE-SU-2013:1958
- openSUSE-SU-2013:1959
- openSUSE-SU-2013:1959
- openSUSE-SU-2014:0008
- openSUSE-SU-2014:0008
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- HPSBUX03091
- HPSBUX03091
- SSRT101667
- SSRT101667
- HPSBUX03092
- HPSBUX03092
- SSRT101668
- SSRT101668
- RHSA-2013:1803
- RHSA-2013:1803
- RHSA-2013:1804
- RHSA-2013:1804
- 56175
- 56175
- 58974
- 58974
- 59058
- 59058
- GLSA-201406-32
- GLSA-201406-32
- http://support.apple.com/kb/HT6150
- http://support.apple.com/kb/HT6150
- http://support.apple.com/kb/HT6162
- http://support.apple.com/kb/HT6162
- http://support.apple.com/kb/HT6163
- http://support.apple.com/kb/HT6163
- DSA-2799
- DSA-2799
- MDVSA-2013:273
- MDVSA-2013:273
- http://www.mozilla.org/security/announce/2013/mfsa2013-116.html
- http://www.mozilla.org/security/announce/2013/mfsa2013-116.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html
- 63676
- 63676
- 1029470
- 1029470
- 1029476
- 1029476
- USN-2052-1
- USN-2052-1
- USN-2053-1
- USN-2053-1
- USN-2060-1
- USN-2060-1
- http://www-01.ibm.com/support/docview.wss?uid=swg21672080
- http://www-01.ibm.com/support/docview.wss?uid=swg21672080
- http://www-01.ibm.com/support/docview.wss?uid=swg21676746
- http://www-01.ibm.com/support/docview.wss?uid=swg21676746
- RHSA-2014:0413
- RHSA-2014:0413
- RHSA-2014:0414
- RHSA-2014:0414
- https://bugzilla.mozilla.org/show_bug.cgi?id=891693
- https://bugzilla.mozilla.org/show_bug.cgi?id=891693
- https://code.google.com/p/chromium/issues/detail?id=258723
- https://code.google.com/p/chromium/issues/detail?id=258723
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2013-6629
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2013-6629
- GLSA-201606-03
- GLSA-201606-03
- https://src.chromium.org/viewvc/chrome?revision=229729&view=revision
- https://src.chromium.org/viewvc/chrome?revision=229729&view=revision
- https://www.ibm.com/support/docview.wss?uid=swg21675973
- https://www.ibm.com/support/docview.wss?uid=swg21675973
Modified: 2024-11-21
CVE-2013-6671
The nsGfxScrollFrameInner::IsLTR function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code via crafted use of JavaScript code for ordered list elements.
- FEDORA-2013-23127
- FEDORA-2013-23127
- FEDORA-2013-23295
- FEDORA-2013-23295
- FEDORA-2013-23519
- FEDORA-2013-23519
- FEDORA-2013-23291
- FEDORA-2013-23291
- SUSE-SU-2013:1919
- SUSE-SU-2013:1919
- openSUSE-SU-2013:1916
- openSUSE-SU-2013:1916
- openSUSE-SU-2013:1917
- openSUSE-SU-2013:1917
- openSUSE-SU-2013:1918
- openSUSE-SU-2013:1918
- openSUSE-SU-2013:1957
- openSUSE-SU-2013:1957
- openSUSE-SU-2013:1958
- openSUSE-SU-2013:1958
- openSUSE-SU-2013:1959
- openSUSE-SU-2013:1959
- openSUSE-SU-2014:0008
- openSUSE-SU-2014:0008
- RHSA-2013:1812
- RHSA-2013:1812
- http://www.mozilla.org/security/announce/2013/mfsa2013-111.html
- http://www.mozilla.org/security/announce/2013/mfsa2013-111.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 64212
- 64212
- 1029470
- 1029470
- 1029476
- 1029476
- USN-2052-1
- USN-2052-1
- USN-2053-1
- USN-2053-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=930281
- https://bugzilla.mozilla.org/show_bug.cgi?id=930281
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2013-6673
Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 do not recognize a user's removal of trust from an EV X.509 certificate, which makes it easier for man-in-the-middle attackers to spoof SSL servers in opportunistic circumstances via a valid certificate that is unacceptable to the user.
- FEDORA-2013-23127
- FEDORA-2013-23127
- FEDORA-2013-23295
- FEDORA-2013-23295
- FEDORA-2013-23519
- FEDORA-2013-23519
- FEDORA-2013-23291
- FEDORA-2013-23291
- SUSE-SU-2013:1919
- SUSE-SU-2013:1919
- openSUSE-SU-2013:1916
- openSUSE-SU-2013:1916
- openSUSE-SU-2013:1917
- openSUSE-SU-2013:1917
- openSUSE-SU-2013:1918
- openSUSE-SU-2013:1918
- openSUSE-SU-2013:1957
- openSUSE-SU-2013:1957
- openSUSE-SU-2013:1958
- openSUSE-SU-2013:1958
- openSUSE-SU-2013:1959
- openSUSE-SU-2013:1959
- openSUSE-SU-2014:0008
- openSUSE-SU-2014:0008
- http://www.mozilla.org/security/announce/2013/mfsa2013-113.html
- http://www.mozilla.org/security/announce/2013/mfsa2013-113.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 64213
- 64213
- 1029470
- 1029470
- 1029476
- 1029476
- USN-2052-1
- USN-2052-1
- USN-2053-1
- USN-2053-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=917380
- https://bugzilla.mozilla.org/show_bug.cgi?id=917380
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-1477
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
- http://download.novell.com/Download?buildid=VYQsgaFpQ2k
- http://download.novell.com/Download?buildid=VYQsgaFpQ2k
- http://download.novell.com/Download?buildid=Y2fux-JW1Qc
- http://download.novell.com/Download?buildid=Y2fux-JW1Qc
- FEDORA-2014-2041
- FEDORA-2014-2041
- FEDORA-2014-2083
- FEDORA-2014-2083
- openSUSE-SU-2014:0212
- openSUSE-SU-2014:0212
- openSUSE-SU-2014:0213
- openSUSE-SU-2014:0213
- SUSE-SU-2014:0248
- SUSE-SU-2014:0248
- openSUSE-SU-2014:0419
- openSUSE-SU-2014:0419
- 102864
- 102864
- RHSA-2014:0132
- RHSA-2014:0132
- RHSA-2014:0133
- RHSA-2014:0133
- 56706
- 56706
- 56761
- 56761
- 56763
- 56763
- 56767
- 56767
- 56787
- 56787
- 56858
- 56858
- 56888
- 56888
- DSA-2858
- DSA-2858
- http://www.mozilla.org/security/announce/2014/mfsa2014-01.html
- http://www.mozilla.org/security/announce/2014/mfsa2014-01.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 65317
- 65317
- 1029717
- 1029717
- 1029720
- 1029720
- 1029721
- 1029721
- USN-2102-1
- USN-2102-1
- USN-2102-2
- USN-2102-2
- USN-2119-1
- USN-2119-1
- https://8pecxstudios.com/?page_id=44080
- https://8pecxstudios.com/?page_id=44080
- https://bugzilla.mozilla.org/show_bug.cgi?id=921470
- https://bugzilla.mozilla.org/show_bug.cgi?id=921470
- https://bugzilla.mozilla.org/show_bug.cgi?id=925896
- https://bugzilla.mozilla.org/show_bug.cgi?id=925896
- https://bugzilla.mozilla.org/show_bug.cgi?id=936808
- https://bugzilla.mozilla.org/show_bug.cgi?id=936808
- https://bugzilla.mozilla.org/show_bug.cgi?id=937132
- https://bugzilla.mozilla.org/show_bug.cgi?id=937132
- https://bugzilla.mozilla.org/show_bug.cgi?id=937697
- https://bugzilla.mozilla.org/show_bug.cgi?id=937697
- https://bugzilla.mozilla.org/show_bug.cgi?id=945334
- https://bugzilla.mozilla.org/show_bug.cgi?id=945334
- https://bugzilla.mozilla.org/show_bug.cgi?id=945939
- https://bugzilla.mozilla.org/show_bug.cgi?id=945939
- https://bugzilla.mozilla.org/show_bug.cgi?id=950000
- https://bugzilla.mozilla.org/show_bug.cgi?id=950000
- https://bugzilla.mozilla.org/show_bug.cgi?id=950438
- https://bugzilla.mozilla.org/show_bug.cgi?id=950438
- https://bugzilla.mozilla.org/show_bug.cgi?id=951366
- https://bugzilla.mozilla.org/show_bug.cgi?id=951366
- https://bugzilla.mozilla.org/show_bug.cgi?id=953114
- https://bugzilla.mozilla.org/show_bug.cgi?id=953114
- firefox-cve20141477-code-exec(90899)
- firefox-cve20141477-code-exec(90899)
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-1479
The System Only Wrapper (SOW) implementation in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 does not prevent certain cloning operations, which allows remote attackers to bypass intended restrictions on XUL content via vectors involving XBL content scopes.
- http://download.novell.com/Download?buildid=VYQsgaFpQ2k
- http://download.novell.com/Download?buildid=VYQsgaFpQ2k
- http://download.novell.com/Download?buildid=Y2fux-JW1Qc
- http://download.novell.com/Download?buildid=Y2fux-JW1Qc
- FEDORA-2014-2041
- FEDORA-2014-2041
- FEDORA-2014-2083
- FEDORA-2014-2083
- openSUSE-SU-2014:0212
- openSUSE-SU-2014:0212
- openSUSE-SU-2014:0213
- openSUSE-SU-2014:0213
- SUSE-SU-2014:0248
- SUSE-SU-2014:0248
- openSUSE-SU-2014:0419
- openSUSE-SU-2014:0419
- 102866
- 102866
- RHSA-2014:0132
- RHSA-2014:0132
- RHSA-2014:0133
- RHSA-2014:0133
- 56706
- 56706
- 56761
- 56761
- 56763
- 56763
- 56767
- 56767
- 56787
- 56787
- 56858
- 56858
- 56888
- 56888
- 56922
- 56922
- DSA-2858
- DSA-2858
- http://www.mozilla.org/security/announce/2014/mfsa2014-02.html
- http://www.mozilla.org/security/announce/2014/mfsa2014-02.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 65320
- 65320
- 1029717
- 1029717
- 1029720
- 1029720
- 1029721
- 1029721
- USN-2102-1
- USN-2102-1
- USN-2102-2
- USN-2102-2
- USN-2119-1
- USN-2119-1
- https://8pecxstudios.com/?page_id=44080
- https://8pecxstudios.com/?page_id=44080
- https://bugzilla.mozilla.org/show_bug.cgi?id=911864
- https://bugzilla.mozilla.org/show_bug.cgi?id=911864
- firefox-cve20141479-sec-bypass(90898)
- firefox-cve20141479-sec-bypass(90898)
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-1481
Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 allow remote attackers to bypass intended restrictions on window objects by leveraging inconsistency in native getter methods across different JavaScript engines.
- http://download.novell.com/Download?buildid=VYQsgaFpQ2k
- http://download.novell.com/Download?buildid=VYQsgaFpQ2k
- http://download.novell.com/Download?buildid=Y2fux-JW1Qc
- http://download.novell.com/Download?buildid=Y2fux-JW1Qc
- FEDORA-2014-2041
- FEDORA-2014-2041
- FEDORA-2014-2083
- FEDORA-2014-2083
- openSUSE-SU-2014:0212
- openSUSE-SU-2014:0212
- openSUSE-SU-2014:0213
- openSUSE-SU-2014:0213
- SUSE-SU-2014:0248
- SUSE-SU-2014:0248
- openSUSE-SU-2014:0419
- openSUSE-SU-2014:0419
- 102863
- 102863
- RHSA-2014:0132
- RHSA-2014:0132
- RHSA-2014:0133
- RHSA-2014:0133
- 56706
- 56706
- 56761
- 56761
- 56763
- 56763
- 56767
- 56767
- 56787
- 56787
- 56858
- 56858
- 56888
- 56888
- 56922
- 56922
- DSA-2858
- DSA-2858
- http://www.mozilla.org/security/announce/2014/mfsa2014-13.html
- http://www.mozilla.org/security/announce/2014/mfsa2014-13.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 65326
- 65326
- 1029717
- 1029717
- 1029720
- 1029720
- 1029721
- 1029721
- USN-2102-1
- USN-2102-1
- USN-2102-2
- USN-2102-2
- USN-2119-1
- USN-2119-1
- https://8pecxstudios.com/?page_id=44080
- https://8pecxstudios.com/?page_id=44080
- https://bugzilla.mozilla.org/show_bug.cgi?id=936056
- https://bugzilla.mozilla.org/show_bug.cgi?id=936056
- firefox-cve20141481-sec-bypass(90883)
- firefox-cve20141481-sec-bypass(90883)
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-1482
RasterImage.cpp in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 does not prevent access to discarded data, which allows remote attackers to execute arbitrary code or cause a denial of service (incorrect write operations) via crafted image data, as demonstrated by Goo Create.
- http://download.novell.com/Download?buildid=VYQsgaFpQ2k
- http://download.novell.com/Download?buildid=VYQsgaFpQ2k
- http://download.novell.com/Download?buildid=Y2fux-JW1Qc
- http://download.novell.com/Download?buildid=Y2fux-JW1Qc
- FEDORA-2014-2041
- FEDORA-2014-2041
- FEDORA-2014-2083
- FEDORA-2014-2083
- openSUSE-SU-2014:0212
- openSUSE-SU-2014:0212
- openSUSE-SU-2014:0213
- openSUSE-SU-2014:0213
- SUSE-SU-2014:0248
- SUSE-SU-2014:0248
- openSUSE-SU-2014:0419
- openSUSE-SU-2014:0419
- 102868
- 102868
- RHSA-2014:0132
- RHSA-2014:0132
- RHSA-2014:0133
- RHSA-2014:0133
- 56706
- 56706
- 56761
- 56761
- 56763
- 56763
- 56767
- 56767
- 56787
- 56787
- 56858
- 56858
- 56888
- 56888
- 56922
- 56922
- DSA-2858
- DSA-2858
- http://www.mozilla.org/security/announce/2014/mfsa2014-04.html
- http://www.mozilla.org/security/announce/2014/mfsa2014-04.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 65328
- 65328
- 1029717
- 1029717
- 1029720
- 1029720
- 1029721
- 1029721
- USN-2102-1
- USN-2102-1
- USN-2102-2
- USN-2102-2
- USN-2119-1
- USN-2119-1
- https://8pecxstudios.com/?page_id=44080
- https://8pecxstudios.com/?page_id=44080
- https://bugzilla.mozilla.org/show_bug.cgi?id=943803
- https://bugzilla.mozilla.org/show_bug.cgi?id=943803
- firefox-cve20141482-code-exec(90894)
- firefox-cve20141482-code-exec(90894)
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-1486
Use-after-free vulnerability in the imgRequestProxy function in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 allows remote attackers to execute arbitrary code via vectors involving unspecified Content-Type values for image data.
- http://download.novell.com/Download?buildid=VYQsgaFpQ2k
- http://download.novell.com/Download?buildid=VYQsgaFpQ2k
- http://download.novell.com/Download?buildid=Y2fux-JW1Qc
- http://download.novell.com/Download?buildid=Y2fux-JW1Qc
- FEDORA-2014-2041
- FEDORA-2014-2041
- FEDORA-2014-2083
- FEDORA-2014-2083
- openSUSE-SU-2014:0212
- openSUSE-SU-2014:0212
- openSUSE-SU-2014:0213
- openSUSE-SU-2014:0213
- SUSE-SU-2014:0248
- SUSE-SU-2014:0248
- openSUSE-SU-2014:0419
- openSUSE-SU-2014:0419
- 102872
- 102872
- RHSA-2014:0132
- RHSA-2014:0132
- RHSA-2014:0133
- RHSA-2014:0133
- 56706
- 56706
- 56761
- 56761
- 56763
- 56763
- 56767
- 56767
- 56787
- 56787
- 56858
- 56858
- 56888
- 56888
- 56922
- 56922
- DSA-2858
- DSA-2858
- http://www.mozilla.org/security/announce/2014/mfsa2014-08.html
- http://www.mozilla.org/security/announce/2014/mfsa2014-08.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 65334
- 65334
- 1029717
- 1029717
- 1029720
- 1029720
- 1029721
- 1029721
- USN-2102-1
- USN-2102-1
- USN-2102-2
- USN-2102-2
- USN-2119-1
- USN-2119-1
- https://8pecxstudios.com/?page_id=44080
- https://8pecxstudios.com/?page_id=44080
- https://bugzilla.mozilla.org/show_bug.cgi?id=942164
- https://bugzilla.mozilla.org/show_bug.cgi?id=942164
- firefox-cve20141486-code-exec(90890)
- firefox-cve20141486-code-exec(90890)
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-1487
The Web workers implementation in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 allows remote attackers to bypass the Same Origin Policy and obtain sensitive authentication information via vectors involving error messages.
- http://download.novell.com/Download?buildid=VYQsgaFpQ2k
- http://download.novell.com/Download?buildid=VYQsgaFpQ2k
- http://download.novell.com/Download?buildid=Y2fux-JW1Qc
- http://download.novell.com/Download?buildid=Y2fux-JW1Qc
- FEDORA-2014-2041
- FEDORA-2014-2041
- FEDORA-2014-2083
- FEDORA-2014-2083
- openSUSE-SU-2014:0212
- openSUSE-SU-2014:0212
- openSUSE-SU-2014:0213
- openSUSE-SU-2014:0213
- SUSE-SU-2014:0248
- SUSE-SU-2014:0248
- openSUSE-SU-2014:0419
- openSUSE-SU-2014:0419
- 102873
- 102873
- RHSA-2014:0132
- RHSA-2014:0132
- RHSA-2014:0133
- RHSA-2014:0133
- 56706
- 56706
- 56761
- 56761
- 56763
- 56763
- 56767
- 56767
- 56787
- 56787
- 56858
- 56858
- 56888
- 56888
- 56922
- 56922
- DSA-2858
- DSA-2858
- http://www.mozilla.org/security/announce/2014/mfsa2014-09.html
- http://www.mozilla.org/security/announce/2014/mfsa2014-09.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 65330
- 65330
- 1029717
- 1029717
- 1029720
- 1029720
- 1029721
- 1029721
- USN-2102-1
- USN-2102-1
- USN-2102-2
- USN-2102-2
- USN-2119-1
- USN-2119-1
- https://8pecxstudios.com/?page_id=44080
- https://8pecxstudios.com/?page_id=44080
- https://bugzilla.mozilla.org/show_bug.cgi?id=947592
- https://bugzilla.mozilla.org/show_bug.cgi?id=947592
- mozilla-cve20141487-info-disc(90889)
- mozilla-cve20141487-info-disc(90889)
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-1490
Race condition in libssl in Mozilla Network Security Services (NSS) before 3.15.4, as used in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, SeaMonkey before 2.24, and other products, allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via vectors involving a resumption handshake that triggers incorrect replacement of a session ticket.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
- FEDORA-2014-2041
- FEDORA-2014-2041
- FEDORA-2014-2083
- FEDORA-2014-2083
- openSUSE-SU-2014:0212
- openSUSE-SU-2014:0212
- openSUSE-SU-2014:0213
- openSUSE-SU-2014:0213
- SUSE-SU-2014:0248
- SUSE-SU-2014:0248
- openSUSE-SU-2014:0419
- openSUSE-SU-2014:0419
- 102876
- 102876
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 56706
- 56706
- 56767
- 56767
- 56787
- 56787
- 56858
- 56858
- 56888
- 56888
- 56922
- 56922
- DSA-2858
- DSA-2858
- http://www.mozilla.org/security/announce/2014/mfsa2014-12.html
- http://www.mozilla.org/security/announce/2014/mfsa2014-12.html
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
- http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 65335
- 65335
- 1029717
- 1029717
- 1029720
- 1029720
- 1029721
- 1029721
- USN-2102-1
- USN-2102-1
- USN-2102-2
- USN-2102-2
- USN-2119-1
- USN-2119-1
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- https://8pecxstudios.com/?page_id=44080
- https://8pecxstudios.com/?page_id=44080
- https://bugzilla.mozilla.org/show_bug.cgi?id=930857
- https://bugzilla.mozilla.org/show_bug.cgi?id=930857
- https://bugzilla.mozilla.org/show_bug.cgi?id=930874
- https://bugzilla.mozilla.org/show_bug.cgi?id=930874
- mozilla-nss-cve20141490-code-exec(90885)
- mozilla-nss-cve20141490-code-exec(90885)
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-1491
Mozilla Network Security Services (NSS) before 3.15.4, as used in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, SeaMonkey before 2.24, and other products, does not properly restrict public values in Diffie-Hellman key exchanges, which makes it easier for remote attackers to bypass cryptographic protection mechanisms in ticket handling by leveraging use of a certain value.
- http://hg.mozilla.org/projects/nss/rev/12c42006aed8
- http://hg.mozilla.org/projects/nss/rev/12c42006aed8
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
- FEDORA-2014-2041
- FEDORA-2014-2041
- FEDORA-2014-2083
- FEDORA-2014-2083
- openSUSE-SU-2014:0212
- openSUSE-SU-2014:0212
- openSUSE-SU-2014:0213
- openSUSE-SU-2014:0213
- SUSE-SU-2014:0248
- SUSE-SU-2014:0248
- openSUSE-SU-2014:0419
- openSUSE-SU-2014:0419
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 56858
- 56858
- 56888
- 56888
- 56922
- 56922
- DSA-2858
- DSA-2858
- DSA-2994
- DSA-2994
- http://www.mozilla.org/security/announce/2014/mfsa2014-12.html
- http://www.mozilla.org/security/announce/2014/mfsa2014-12.html
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
- http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 65332
- 65332
- 1029717
- 1029717
- 1029720
- 1029720
- 1029721
- 1029721
- USN-2102-1
- USN-2102-1
- USN-2102-2
- USN-2102-2
- USN-2119-1
- USN-2119-1
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=934545
- https://bugzilla.mozilla.org/show_bug.cgi?id=934545
- firefox-nss-cve20141491-unspecified(90886)
- firefox-nss-cve20141491-unspecified(90886)
- GLSA-201504-01
- GLSA-201504-01
No data currently available.
No data currently available.
No data currently available.
No data currently available.
No data currently available.
No data currently available.
No data currently available.
No data currently available.
No data currently available.