ALT-PU-2015-1464-1
Package firefox-esr updated to version 38.0.1-alt1 for branch sisyphus in task 144788.
Closed vulnerabilities
BDU:2015-00241
Уязвимость браузера Google Chrome, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-00450
Уязвимость браузера Firefox, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-00466
Уязвимость программного обеспечения Firefox ESR, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-00677
Уязвимость программного обеспечения SeaMonkey, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-00709
Уязвимость программного обеспечения Thunderbird, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-09815
Уязвимость браузера Firefox, позволяющая удаленному злоумышленнику выполнить произвольный код или вызвать отказ в обслуживании
BDU:2015-09816
Уязвимость браузера Firefox ESR, позволяющая удаленному злоумышленнику выполнить произвольный код или вызвать отказ в обслуживании
BDU:2015-09817
Уязвимость программного обеспечения SeaMonkey, позволяющая удаленному злоумышленнику выполнить произвольный код или вызвать отказ в обслуживании
BDU:2015-09884
Уязвимости браузера Firefox, позволяющие удалённому злоумышленнику вызвать отказ в обслуживании
BDU:2015-09885
Уязвимости браузера Firefox ESR, позволяющие удалённому злоумышленнику вызвать отказ в обслуживании
BDU:2015-09886
Уязвимости почтового клиента Thunderbird, позволяющие удалённому злоумышленнику вызвать отказ в обслуживании
BDU:2015-09888
Уязвимость браузера Firefox, позволяющая удалённому злоумышленнику выполнить произвольный JavaScript-код
BDU:2015-09889
Уязвимость браузера Firefox ESR, позволяющая удалённому злоумышленнику выполнить произвольный JavaScript-код
BDU:2015-09890
Уязвимость почтового клиента Thunderbird, позволяющая удалённому злоумышленнику выполнить произвольный JavaScript-код
BDU:2015-09891
Уязвимость браузера Firefox, позволяющая удалённому злоумышленнику получить доступ к динамической памяти процесса или вызвать отказ в обслуживании
BDU:2015-09892
Уязвимость браузера Firefox, позволяющая удалённому злоумышленнику вызвать отказ в обслуживании
BDU:2015-09893
Уязвимость браузера Firefox, позволяющая удалённому злоумышленнику подделать межсайтовые запросы
BDU:2015-09894
Уязвимость браузера Firefox ESR, позволяющая удалённому злоумышленнику подделать межсайтовые запросы
BDU:2015-09895
Уязвимость почтового клиента Thunderbird, позволяющая удалённому злоумышленнику подделать межсайтовые запросы
BDU:2015-09896
Уязвимость браузера Firefox, позволяющая удалённому злоумышленнику выполнить произвольный код или вызвать отказ в обслуживании
BDU:2015-09897
Уязвимость браузера Firefox, позволяющая удалённому злоумышленнику выполнить произвольный код или вызвать отказ в обслуживании
BDU:2015-09898
Уязвимость браузера Firefox, позволяющая удалённому злоумышленнику выполнить произвольный код или вызвать отказ в обслуживании
BDU:2015-09899
Уязвимость браузера Firefox, позволяющая удалённому злоумышленнику выполнить произвольный код или вызвать отказ в обслуживании
BDU:2015-09900
Уязвимость браузера Firefox, позволяющая удалённому злоумышленнику выполнить произвольный JavaScript-код
BDU:2015-09901
Уязвимость браузера Firefox ESR, позволяющая удалённому злоумышленнику выполнить произвольный JavaScript-код
BDU:2015-09902
Уязвимость почтового клиента Thunderbird, позволяющая удалённому злоумышленнику выполнить произвольный JavaScript-код
BDU:2015-09903
Уязвимость браузера Firefox, позволяющая удалённому злоумышленнику выполнить произвольный JavaScript-код
BDU:2015-09904
Уязвимость браузера Firefox, позволяющая удалённому злоумышленнику обойти проверку сертификата
BDU:2015-10003
Уязвимость программной платформы Oracle Fusion Middleware, позволяющая удаленному нарушителю подменить RSA-подпись
BDU:2015-10028
Уязвимость браузера Firefox, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2015-11141
Уязвимости браузера Firefox, позволяющие нарушителю выполнить произвольный код
BDU:2021-03335
Уязвимость браузера Mozilla Firefox, вызванная переполнением буфера, позволяющая нарушителю выполнить произвольный код
Modified: 2018-10-30
CVE-2011-3079
The Inter-process Communication (IPC) implementation in Google Chrome before 18.0.1025.168, as used in Mozilla Firefox before 38.0 and other products, does not properly validate messages, which has unspecified impact and attack vectors.
- http://code.google.com/p/chromium/issues/detail?id=117627
- http://googlechromereleases.blogspot.com/2012/04/stable-channel-update_30.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-57.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=1087565
- openSUSE-SU-2015:0934
- openSUSE-SU-2015:1266
- https://www.mozilla.org/en-US/security/known-vulnerabilities/thunderbird/#thunderbird31.7
- DSA-3260
- RHSA-2015:1012
- openSUSE-SU-2015:0892
- oval:org.mitre.oval:def:14964
- chrome-ipc-validation-code-execution(75271)
- 1027001
- 53309
- 48992
- 81645
Modified: 2024-11-21
CVE-2014-1568
Mozilla Network Security Services (NSS) before 3.16.2.1, 3.16.x before 3.16.5, and 3.17.x before 3.17.1, as used in Mozilla Firefox before 32.0.3, Mozilla Firefox ESR 24.x before 24.8.1 and 31.x before 31.1.1, Mozilla Thunderbird before 24.8.1 and 31.x before 31.1.2, Mozilla SeaMonkey before 2.29.1, Google Chrome before 37.0.2062.124 on Windows and OS X, and Google Chrome OS before 37.0.2062.120, does not properly parse ASN.1 values in X.509 certificates, which makes it easier for remote attackers to spoof RSA signatures via a crafted certificate, aka a "signature malleability" issue.
- http://googlechromereleases.blogspot.com/2014/09/stable-channel-update_24.html
- http://googlechromereleases.blogspot.com/2014/09/stable-channel-update_24.html
- http://googlechromereleases.blogspot.com/2014/09/stable-channel-update-for-chrome-os_24.html
- http://googlechromereleases.blogspot.com/2014/09/stable-channel-update-for-chrome-os_24.html
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
- SUSE-SU-2014:1220
- SUSE-SU-2014:1220
- openSUSE-SU-2014:1224
- openSUSE-SU-2014:1224
- openSUSE-SU-2014:1232
- openSUSE-SU-2014:1232
- RHSA-2014:1307
- RHSA-2014:1307
- RHSA-2014:1354
- RHSA-2014:1354
- RHSA-2014:1371
- RHSA-2014:1371
- 61540
- 61540
- 61574
- 61574
- 61575
- 61575
- 61576
- 61576
- 61583
- 61583
- DSA-3033
- DSA-3033
- DSA-3034
- DSA-3034
- DSA-3037
- DSA-3037
- VU#772676
- VU#772676
- http://www.mozilla.org/security/announce/2014/mfsa2014-73.html
- http://www.mozilla.org/security/announce/2014/mfsa2014-73.html
- http://www.novell.com/support/kb/doc.php?id=7015701
- http://www.novell.com/support/kb/doc.php?id=7015701
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 70116
- 70116
- USN-2360-1
- USN-2360-1
- USN-2360-2
- USN-2360-2
- USN-2361-1
- USN-2361-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1064636
- https://bugzilla.mozilla.org/show_bug.cgi?id=1064636
- https://bugzilla.mozilla.org/show_bug.cgi?id=1069405
- https://bugzilla.mozilla.org/show_bug.cgi?id=1069405
- mozilla-nss-cve20141568-sec-bypass(96194)
- mozilla-nss-cve20141568-sec-bypass(96194)
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-1574
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
- FEDORA-2014-14084
- FEDORA-2014-14084
- FEDORA-2014-13042
- FEDORA-2014-13042
- openSUSE-SU-2015:0138
- openSUSE-SU-2015:0138
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:1266
- openSUSE-SU-2014:1343
- openSUSE-SU-2014:1343
- openSUSE-SU-2014:1344
- openSUSE-SU-2014:1344
- openSUSE-SU-2014:1345
- openSUSE-SU-2014:1345
- openSUSE-SU-2014:1346
- openSUSE-SU-2014:1346
- RHSA-2014:1635
- RHSA-2014:1635
- RHSA-2014:1647
- RHSA-2014:1647
- 61387
- 61387
- 61854
- 61854
- 62021
- 62021
- 62022
- 62022
- 62023
- 62023
- DSA-3050
- DSA-3050
- DSA-3061
- DSA-3061
- http://www.mozilla.org/security/announce/2014/mfsa2014-74.html
- http://www.mozilla.org/security/announce/2014/mfsa2014-74.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 70436
- 70436
- 1031028
- 1031028
- 1031030
- 1031030
- USN-2372-1
- USN-2372-1
- USN-2373-1
- USN-2373-1
- https://advisories.mageia.org/MGASA-2014-0421.html
- https://advisories.mageia.org/MGASA-2014-0421.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=1011354
- https://bugzilla.mozilla.org/show_bug.cgi?id=1011354
- https://bugzilla.mozilla.org/show_bug.cgi?id=1061214
- https://bugzilla.mozilla.org/show_bug.cgi?id=1061214
- https://bugzilla.mozilla.org/show_bug.cgi?id=1061600
- https://bugzilla.mozilla.org/show_bug.cgi?id=1061600
- https://bugzilla.mozilla.org/show_bug.cgi?id=1064346
- https://bugzilla.mozilla.org/show_bug.cgi?id=1064346
- https://bugzilla.mozilla.org/show_bug.cgi?id=1072044
- https://bugzilla.mozilla.org/show_bug.cgi?id=1072044
- https://bugzilla.mozilla.org/show_bug.cgi?id=1072174
- https://bugzilla.mozilla.org/show_bug.cgi?id=1072174
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-1575
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 33.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to improper interaction between threading and garbage collection in the GCRuntime::triggerGC function in js/src/jsgc.cpp, and unknown other vectors.
- FEDORA-2014-14084
- FEDORA-2014-14084
- FEDORA-2014-13042
- FEDORA-2014-13042
- openSUSE-SU-2014:1344
- openSUSE-SU-2014:1344
- openSUSE-SU-2014:1345
- openSUSE-SU-2014:1345
- 62022
- 62022
- 62023
- 62023
- http://www.mozilla.org/security/announce/2014/mfsa2014-74.html
- http://www.mozilla.org/security/announce/2014/mfsa2014-74.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 70439
- 70439
- 1031028
- 1031028
- 1031030
- 1031030
- USN-2372-1
- USN-2372-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1001994
- https://bugzilla.mozilla.org/show_bug.cgi?id=1001994
- https://bugzilla.mozilla.org/show_bug.cgi?id=1018916
- https://bugzilla.mozilla.org/show_bug.cgi?id=1018916
- https://bugzilla.mozilla.org/show_bug.cgi?id=1020034
- https://bugzilla.mozilla.org/show_bug.cgi?id=1020034
- https://bugzilla.mozilla.org/show_bug.cgi?id=1023035
- https://bugzilla.mozilla.org/show_bug.cgi?id=1023035
- https://bugzilla.mozilla.org/show_bug.cgi?id=1032208
- https://bugzilla.mozilla.org/show_bug.cgi?id=1032208
- https://bugzilla.mozilla.org/show_bug.cgi?id=1033020
- https://bugzilla.mozilla.org/show_bug.cgi?id=1033020
- https://bugzilla.mozilla.org/show_bug.cgi?id=1034230
- https://bugzilla.mozilla.org/show_bug.cgi?id=1034230
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-1576
Heap-based buffer overflow in the nsTransformedTextRun function in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to execute arbitrary code via Cascading Style Sheets (CSS) token sequences that trigger changes to capitalization style.
- FEDORA-2014-14084
- FEDORA-2014-14084
- FEDORA-2014-13042
- FEDORA-2014-13042
- openSUSE-SU-2015:0138
- openSUSE-SU-2015:0138
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:1266
- openSUSE-SU-2014:1343
- openSUSE-SU-2014:1343
- openSUSE-SU-2014:1344
- openSUSE-SU-2014:1344
- openSUSE-SU-2014:1345
- openSUSE-SU-2014:1345
- openSUSE-SU-2014:1346
- openSUSE-SU-2014:1346
- RHSA-2014:1635
- RHSA-2014:1635
- 61387
- 61387
- 61854
- 61854
- 62021
- 62021
- 62022
- 62022
- 62023
- 62023
- DSA-3050
- DSA-3050
- DSA-3061
- DSA-3061
- http://www.mozilla.org/security/announce/2014/mfsa2014-75.html
- http://www.mozilla.org/security/announce/2014/mfsa2014-75.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 70430
- 70430
- 1031028
- 1031028
- 1031030
- 1031030
- USN-2372-1
- USN-2372-1
- USN-2373-1
- USN-2373-1
- https://advisories.mageia.org/MGASA-2014-0421.html
- https://advisories.mageia.org/MGASA-2014-0421.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=1041512
- https://bugzilla.mozilla.org/show_bug.cgi?id=1041512
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-1577
The mozilla::dom::OscillatorNodeEngine::ComputeCustom function in the Web Audio subsystem in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read, memory corruption, and application crash) via an invalid custom waveform that triggers a calculation of a negative frequency value.
- FEDORA-2014-14084
- FEDORA-2014-14084
- FEDORA-2014-13042
- FEDORA-2014-13042
- openSUSE-SU-2015:0138
- openSUSE-SU-2015:0138
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:1266
- openSUSE-SU-2014:1343
- openSUSE-SU-2014:1343
- openSUSE-SU-2014:1344
- openSUSE-SU-2014:1344
- openSUSE-SU-2014:1345
- openSUSE-SU-2014:1345
- openSUSE-SU-2014:1346
- openSUSE-SU-2014:1346
- RHSA-2014:1635
- RHSA-2014:1635
- RHSA-2014:1647
- RHSA-2014:1647
- 61387
- 61387
- 61854
- 61854
- 62021
- 62021
- 62022
- 62022
- 62023
- 62023
- DSA-3050
- DSA-3050
- DSA-3061
- DSA-3061
- http://www.mozilla.org/security/announce/2014/mfsa2014-76.html
- http://www.mozilla.org/security/announce/2014/mfsa2014-76.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 70440
- 70440
- 1031028
- 1031028
- 1031030
- 1031030
- USN-2372-1
- USN-2372-1
- USN-2373-1
- USN-2373-1
- https://advisories.mageia.org/MGASA-2014-0421.html
- https://advisories.mageia.org/MGASA-2014-0421.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=1012609
- https://bugzilla.mozilla.org/show_bug.cgi?id=1012609
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-1578
The get_tile function in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly execute arbitrary code via WebM frames with invalid tile sizes that are improperly handled in buffering operations during video playback.
- FEDORA-2014-14084
- FEDORA-2014-14084
- FEDORA-2014-13042
- FEDORA-2014-13042
- openSUSE-SU-2015:0138
- openSUSE-SU-2015:0138
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:1266
- openSUSE-SU-2014:1343
- openSUSE-SU-2014:1343
- openSUSE-SU-2014:1344
- openSUSE-SU-2014:1344
- openSUSE-SU-2014:1345
- openSUSE-SU-2014:1345
- openSUSE-SU-2014:1346
- openSUSE-SU-2014:1346
- RHSA-2014:1635
- RHSA-2014:1635
- RHSA-2014:1647
- RHSA-2014:1647
- 61387
- 61387
- 61854
- 61854
- 62021
- 62021
- 62022
- 62022
- 62023
- 62023
- DSA-3050
- DSA-3050
- DSA-3061
- DSA-3061
- http://www.mozilla.org/security/announce/2014/mfsa2014-77.html
- http://www.mozilla.org/security/announce/2014/mfsa2014-77.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 70428
- 70428
- 1031028
- 1031028
- 1031030
- 1031030
- USN-2372-1
- USN-2372-1
- USN-2373-1
- USN-2373-1
- https://advisories.mageia.org/MGASA-2014-0421.html
- https://advisories.mageia.org/MGASA-2014-0421.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=1063327
- https://bugzilla.mozilla.org/show_bug.cgi?id=1063327
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-1580
Mozilla Firefox before 33.0 does not properly initialize memory for GIF images, which allows remote attackers to obtain sensitive information from process memory via a crafted web page that triggers a sequence of rendering operations for truncated GIF data within a CANVAS element.
- FEDORA-2014-14084
- FEDORA-2014-14084
- FEDORA-2014-13042
- FEDORA-2014-13042
- openSUSE-SU-2014:1344
- openSUSE-SU-2014:1344
- openSUSE-SU-2014:1345
- openSUSE-SU-2014:1345
- 62022
- 62022
- 62023
- 62023
- http://www.mozilla.org/security/announce/2014/mfsa2014-78.html
- http://www.mozilla.org/security/announce/2014/mfsa2014-78.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 70431
- 70431
- 1031028
- 1031028
- USN-2372-1
- USN-2372-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1063733
- https://bugzilla.mozilla.org/show_bug.cgi?id=1063733
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-1581
Use-after-free vulnerability in DirectionalityUtils.cpp in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to execute arbitrary code via text that is improperly handled during the interaction between directionality resolution and layout.
- FEDORA-2014-14084
- FEDORA-2014-14084
- FEDORA-2014-13042
- FEDORA-2014-13042
- openSUSE-SU-2015:0138
- openSUSE-SU-2015:0138
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:1266
- openSUSE-SU-2014:1343
- openSUSE-SU-2014:1343
- openSUSE-SU-2014:1344
- openSUSE-SU-2014:1344
- openSUSE-SU-2014:1345
- openSUSE-SU-2014:1345
- openSUSE-SU-2014:1346
- openSUSE-SU-2014:1346
- RHSA-2014:1635
- RHSA-2014:1635
- RHSA-2014:1647
- RHSA-2014:1647
- 61387
- 61387
- 61854
- 61854
- 62021
- 62021
- 62022
- 62022
- 62023
- 62023
- DSA-3050
- DSA-3050
- DSA-3061
- DSA-3061
- http://www.mozilla.org/security/announce/2014/mfsa2014-79.html
- http://www.mozilla.org/security/announce/2014/mfsa2014-79.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 70426
- 70426
- 1031028
- 1031028
- 1031030
- 1031030
- USN-2372-1
- USN-2372-1
- USN-2373-1
- USN-2373-1
- https://advisories.mageia.org/MGASA-2014-0421.html
- https://advisories.mageia.org/MGASA-2014-0421.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=1068218
- https://bugzilla.mozilla.org/show_bug.cgi?id=1068218
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-1582
The Public Key Pinning (PKP) implementation in Mozilla Firefox before 33.0 does not properly consider the connection-coalescing behavior of SPDY and HTTP/2 in the case of a shared IP address, which allows man-in-the-middle attackers to bypass an intended pinning configuration and spoof a web site by providing a valid certificate from an arbitrary recognized Certification Authority.
- FEDORA-2014-14084
- FEDORA-2014-14084
- FEDORA-2014-13042
- FEDORA-2014-13042
- openSUSE-SU-2014:1344
- openSUSE-SU-2014:1344
- openSUSE-SU-2014:1345
- openSUSE-SU-2014:1345
- 62022
- 62022
- 62023
- 62023
- http://www.mozilla.org/security/announce/2014/mfsa2014-80.html
- http://www.mozilla.org/security/announce/2014/mfsa2014-80.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 70432
- 70432
- 1031028
- 1031028
- USN-2372-1
- USN-2372-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1049095
- https://bugzilla.mozilla.org/show_bug.cgi?id=1049095
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-1583
The Alarm API in Mozilla Firefox before 33.0 and Firefox ESR 31.x before 31.2 does not properly restrict toJSON calls, which allows remote attackers to bypass the Same Origin Policy via crafted API calls that access sensitive information within the JSON data of an alarm.
- FEDORA-2014-14084
- FEDORA-2014-14084
- FEDORA-2014-13042
- FEDORA-2014-13042
- openSUSE-SU-2014:1344
- openSUSE-SU-2014:1344
- openSUSE-SU-2014:1345
- openSUSE-SU-2014:1345
- RHSA-2014:1635
- RHSA-2014:1635
- 61854
- 61854
- 62022
- 62022
- 62023
- 62023
- DSA-3050
- DSA-3050
- http://www.mozilla.org/security/announce/2014/mfsa2014-82.html
- http://www.mozilla.org/security/announce/2014/mfsa2014-82.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 70424
- 70424
- 1031028
- 1031028
- 1031030
- 1031030
- USN-2372-1
- USN-2372-1
- https://advisories.mageia.org/MGASA-2014-0421.html
- https://advisories.mageia.org/MGASA-2014-0421.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=1015540
- https://bugzilla.mozilla.org/show_bug.cgi?id=1015540
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-1584
The Public Key Pinning (PKP) implementation in Mozilla Firefox before 33.0 skips pinning checks upon an unspecified issuer-verification error, which makes it easier for remote attackers to bypass an intended pinning configuration and spoof a web site via a crafted certificate that leads to presentation of the Untrusted Connection dialog to the user.
- FEDORA-2014-14084
- FEDORA-2014-14084
- FEDORA-2014-13042
- FEDORA-2014-13042
- openSUSE-SU-2014:1344
- openSUSE-SU-2014:1344
- openSUSE-SU-2014:1345
- openSUSE-SU-2014:1345
- 62022
- 62022
- 62023
- 62023
- http://www.mozilla.org/security/announce/2014/mfsa2014-80.html
- http://www.mozilla.org/security/announce/2014/mfsa2014-80.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 70434
- 70434
- 1031028
- 1031028
- USN-2372-1
- USN-2372-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1066190
- https://bugzilla.mozilla.org/show_bug.cgi?id=1066190
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-1585
The WebRTC video-sharing feature in dom/media/MediaManager.cpp in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 does not properly recognize Stop Sharing actions for videos in IFRAME elements, which allows remote attackers to obtain sensitive information from the local camera by maintaining a session after the user tries to discontinue streaming.
- FEDORA-2014-14084
- FEDORA-2014-14084
- FEDORA-2014-13042
- FEDORA-2014-13042
- openSUSE-SU-2015:0138
- openSUSE-SU-2015:0138
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:1266
- openSUSE-SU-2014:1343
- openSUSE-SU-2014:1343
- openSUSE-SU-2014:1344
- openSUSE-SU-2014:1344
- openSUSE-SU-2014:1345
- openSUSE-SU-2014:1345
- openSUSE-SU-2014:1346
- openSUSE-SU-2014:1346
- 61387
- 61387
- 62021
- 62021
- 62022
- 62022
- 62023
- 62023
- DSA-3050
- DSA-3050
- DSA-3061
- DSA-3061
- http://www.mozilla.org/security/announce/2014/mfsa2014-81.html
- http://www.mozilla.org/security/announce/2014/mfsa2014-81.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 70425
- 70425
- 1031028
- 1031028
- 1031030
- 1031030
- USN-2372-1
- USN-2372-1
- USN-2373-1
- USN-2373-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1062876
- https://bugzilla.mozilla.org/show_bug.cgi?id=1062876
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-1586
content/base/src/nsDocument.cpp in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 does not consider whether WebRTC video sharing is occurring, which allows remote attackers to obtain sensitive information from the local camera in certain IFRAME situations by maintaining a session after the user temporarily navigates away.
- FEDORA-2014-14084
- FEDORA-2014-14084
- FEDORA-2014-13042
- FEDORA-2014-13042
- openSUSE-SU-2015:0138
- openSUSE-SU-2015:0138
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:1266
- openSUSE-SU-2014:1343
- openSUSE-SU-2014:1343
- openSUSE-SU-2014:1344
- openSUSE-SU-2014:1344
- openSUSE-SU-2014:1345
- openSUSE-SU-2014:1345
- openSUSE-SU-2014:1346
- openSUSE-SU-2014:1346
- 61387
- 61387
- 62021
- 62021
- 62022
- 62022
- 62023
- 62023
- DSA-3050
- DSA-3050
- DSA-3061
- DSA-3061
- http://www.mozilla.org/security/announce/2014/mfsa2014-81.html
- http://www.mozilla.org/security/announce/2014/mfsa2014-81.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 70427
- 70427
- 1031028
- 1031028
- 1031030
- 1031030
- USN-2372-1
- USN-2372-1
- USN-2373-1
- USN-2373-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1062981
- https://bugzilla.mozilla.org/show_bug.cgi?id=1062981
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-1587
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
- openSUSE-SU-2015:0138
- openSUSE-SU-2015:0138
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:1266
- DSA-3090
- DSA-3090
- DSA-3092
- DSA-3092
- http://www.mozilla.org/security/announce/2014/mfsa2014-83.html
- http://www.mozilla.org/security/announce/2014/mfsa2014-83.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 71391
- 71391
- https://bugzilla.mozilla.org/show_bug.cgi?id=1042567
- https://bugzilla.mozilla.org/show_bug.cgi?id=1042567
- https://bugzilla.mozilla.org/show_bug.cgi?id=1072847
- https://bugzilla.mozilla.org/show_bug.cgi?id=1072847
- https://bugzilla.mozilla.org/show_bug.cgi?id=1079729
- https://bugzilla.mozilla.org/show_bug.cgi?id=1079729
- https://bugzilla.mozilla.org/show_bug.cgi?id=1080312
- https://bugzilla.mozilla.org/show_bug.cgi?id=1080312
- https://bugzilla.mozilla.org/show_bug.cgi?id=1089207
- https://bugzilla.mozilla.org/show_bug.cgi?id=1089207
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-1588
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 34.0 and SeaMonkey before 2.31 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
- http://www.mozilla.org/security/announce/2014/mfsa2014-83.html
- http://www.mozilla.org/security/announce/2014/mfsa2014-83.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=1013001
- https://bugzilla.mozilla.org/show_bug.cgi?id=1013001
- https://bugzilla.mozilla.org/show_bug.cgi?id=1023158
- https://bugzilla.mozilla.org/show_bug.cgi?id=1023158
- https://bugzilla.mozilla.org/show_bug.cgi?id=1026037
- https://bugzilla.mozilla.org/show_bug.cgi?id=1026037
- https://bugzilla.mozilla.org/show_bug.cgi?id=1037830
- https://bugzilla.mozilla.org/show_bug.cgi?id=1037830
- https://bugzilla.mozilla.org/show_bug.cgi?id=1048517
- https://bugzilla.mozilla.org/show_bug.cgi?id=1048517
- https://bugzilla.mozilla.org/show_bug.cgi?id=1064835
- https://bugzilla.mozilla.org/show_bug.cgi?id=1064835
- https://bugzilla.mozilla.org/show_bug.cgi?id=1073577
- https://bugzilla.mozilla.org/show_bug.cgi?id=1073577
- https://bugzilla.mozilla.org/show_bug.cgi?id=1075546
- https://bugzilla.mozilla.org/show_bug.cgi?id=1075546
- https://bugzilla.mozilla.org/show_bug.cgi?id=1077687
- https://bugzilla.mozilla.org/show_bug.cgi?id=1077687
- https://bugzilla.mozilla.org/show_bug.cgi?id=1086842
- https://bugzilla.mozilla.org/show_bug.cgi?id=1086842
- https://bugzilla.mozilla.org/show_bug.cgi?id=1096026
- https://bugzilla.mozilla.org/show_bug.cgi?id=1096026
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-1589
Mozilla Firefox before 34.0 and SeaMonkey before 2.31 provide stylesheets with an incorrect primary namespace, which allows remote attackers to bypass intended access restrictions via an XBL binding.
- http://www.mozilla.org/security/announce/2014/mfsa2014-84.html
- http://www.mozilla.org/security/announce/2014/mfsa2014-84.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=1043787
- https://bugzilla.mozilla.org/show_bug.cgi?id=1043787
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-1590
The XMLHttpRequest.prototype.send method in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to cause a denial of service (application crash) via a crafted JavaScript object.
- openSUSE-SU-2015:0138
- openSUSE-SU-2015:0138
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:1266
- DSA-3090
- DSA-3090
- DSA-3092
- DSA-3092
- http://www.mozilla.org/security/announce/2014/mfsa2014-85.html
- http://www.mozilla.org/security/announce/2014/mfsa2014-85.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 71397
- 71397
- https://bugzilla.mozilla.org/show_bug.cgi?id=1087633
- https://bugzilla.mozilla.org/show_bug.cgi?id=1087633
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-1592
Use-after-free vulnerability in the nsHtml5TreeOperation function in xul.dll in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to execute arbitrary code by adding a second root element to an HTML5 document during parsing.
- openSUSE-SU-2015:0138
- openSUSE-SU-2015:0138
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:1266
- DSA-3090
- DSA-3090
- DSA-3092
- DSA-3092
- http://www.mozilla.org/security/announce/2014/mfsa2014-87.html
- http://www.mozilla.org/security/announce/2014/mfsa2014-87.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 71398
- 71398
- https://bugzilla.mozilla.org/show_bug.cgi?id=1088635
- https://bugzilla.mozilla.org/show_bug.cgi?id=1088635
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-1593
Stack-based buffer overflow in the mozilla::FileBlockCache::Read function in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to execute arbitrary code via crafted media content.
- openSUSE-SU-2015:0138
- openSUSE-SU-2015:0138
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:1266
- DSA-3090
- DSA-3090
- DSA-3092
- DSA-3092
- http://www.mozilla.org/security/announce/2014/mfsa2014-88.html
- http://www.mozilla.org/security/announce/2014/mfsa2014-88.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 71395
- 71395
- https://bugzilla.mozilla.org/show_bug.cgi?id=1085175
- https://bugzilla.mozilla.org/show_bug.cgi?id=1085175
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-1594
Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 might allow remote attackers to execute arbitrary code by leveraging an incorrect cast from the BasicThebesLayer data type to the BasicContainerLayer data type.
- openSUSE-SU-2015:0138
- openSUSE-SU-2015:0138
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:1266
- DSA-3090
- DSA-3090
- DSA-3092
- DSA-3092
- http://www.mozilla.org/security/announce/2014/mfsa2014-89.html
- http://www.mozilla.org/security/announce/2014/mfsa2014-89.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 71396
- 71396
- https://bugzilla.mozilla.org/show_bug.cgi?id=1074280
- https://bugzilla.mozilla.org/show_bug.cgi?id=1074280
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-8631
The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 34.0 and SeaMonkey before 2.31 supports native-interface passing, which allows remote attackers to bypass intended DOM object restrictions via a call to an unspecified method.
- http://www.mozilla.org/security/announce/2014/mfsa2014-91.html
- http://www.mozilla.org/security/announce/2014/mfsa2014-91.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=821573
- https://bugzilla.mozilla.org/show_bug.cgi?id=821573
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-8632
The structured-clone implementation in Mozilla Firefox before 34.0 and SeaMonkey before 2.31 does not properly interact with XrayWrapper property filtering, which allows remote attackers to bypass intended DOM object restrictions by leveraging property availability after XrayWrapper removal.
- http://www.mozilla.org/security/announce/2014/mfsa2014-91.html
- http://www.mozilla.org/security/announce/2014/mfsa2014-91.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=1050340
- https://bugzilla.mozilla.org/show_bug.cgi?id=1050340
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-8634
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, Thunderbird before 31.4, and SeaMonkey before 2.32 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
- http://linux.oracle.com/errata/ELSA-2015-0046.html
- http://linux.oracle.com/errata/ELSA-2015-0046.html
- http://linux.oracle.com/errata/ELSA-2015-0047.html
- http://linux.oracle.com/errata/ELSA-2015-0047.html
- openSUSE-SU-2015:0077
- openSUSE-SU-2015:0077
- SUSE-SU-2015:0171
- SUSE-SU-2015:0171
- SUSE-SU-2015:0173
- SUSE-SU-2015:0173
- SUSE-SU-2015:0180
- SUSE-SU-2015:0180
- openSUSE-SU-2015:0192
- openSUSE-SU-2015:0192
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:0133
- openSUSE-SU-2015:0133
- RHSA-2015:0046
- RHSA-2015:0046
- RHSA-2015:0047
- RHSA-2015:0047
- 62237
- 62237
- 62242
- 62242
- 62250
- 62250
- 62253
- 62253
- 62259
- 62259
- 62273
- 62273
- 62274
- 62274
- 62283
- 62283
- 62293
- 62293
- 62304
- 62304
- 62313
- 62313
- 62315
- 62315
- 62316
- 62316
- 62418
- 62418
- 62446
- 62446
- 62657
- 62657
- 62790
- 62790
- DSA-3127
- DSA-3127
- DSA-3132
- DSA-3132
- http://www.mozilla.org/security/announce/2014/mfsa2015-01.html
- http://www.mozilla.org/security/announce/2014/mfsa2015-01.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 72049
- 72049
- 1031533
- 1031533
- 1031534
- 1031534
- USN-2460-1
- USN-2460-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1109889
- https://bugzilla.mozilla.org/show_bug.cgi?id=1109889
- https://bugzilla.mozilla.org/show_bug.cgi?id=1111737
- https://bugzilla.mozilla.org/show_bug.cgi?id=1111737
- firefox-cve20148634-code-exec(99955)
- firefox-cve20148634-code-exec(99955)
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-8635
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 35.0 and SeaMonkey before 2.32 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
- openSUSE-SU-2015:0077
- openSUSE-SU-2015:0077
- openSUSE-SU-2015:0192
- openSUSE-SU-2015:0192
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:0133
- openSUSE-SU-2015:0133
- 62242
- 62242
- 62250
- 62250
- 62253
- 62253
- 62316
- 62316
- 62418
- 62418
- 62446
- 62446
- 62657
- 62657
- 62790
- 62790
- http://www.mozilla.org/security/announce/2014/mfsa2015-01.html
- http://www.mozilla.org/security/announce/2014/mfsa2015-01.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 72050
- 72050
- 1031533
- 1031533
- 1031534
- 1031534
- https://bugzilla.mozilla.org/show_bug.cgi?id=1026774
- https://bugzilla.mozilla.org/show_bug.cgi?id=1026774
- https://bugzilla.mozilla.org/show_bug.cgi?id=1027300
- https://bugzilla.mozilla.org/show_bug.cgi?id=1027300
- https://bugzilla.mozilla.org/show_bug.cgi?id=1054538
- https://bugzilla.mozilla.org/show_bug.cgi?id=1054538
- https://bugzilla.mozilla.org/show_bug.cgi?id=1067473
- https://bugzilla.mozilla.org/show_bug.cgi?id=1067473
- https://bugzilla.mozilla.org/show_bug.cgi?id=1070962
- https://bugzilla.mozilla.org/show_bug.cgi?id=1070962
- https://bugzilla.mozilla.org/show_bug.cgi?id=1072130
- https://bugzilla.mozilla.org/show_bug.cgi?id=1072130
- https://bugzilla.mozilla.org/show_bug.cgi?id=1072871
- https://bugzilla.mozilla.org/show_bug.cgi?id=1072871
- https://bugzilla.mozilla.org/show_bug.cgi?id=1098583
- https://bugzilla.mozilla.org/show_bug.cgi?id=1098583
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-8636
The XrayWrapper implementation in Mozilla Firefox before 35.0 and SeaMonkey before 2.32 does not properly interact with a DOM object that has a named getter, which might allow remote attackers to execute arbitrary JavaScript code with chrome privileges via unspecified vectors.
- openSUSE-SU-2015:0077
- openSUSE-SU-2015:0077
- SUSE-SU-2015:0171
- SUSE-SU-2015:0171
- SUSE-SU-2015:0173
- SUSE-SU-2015:0173
- SUSE-SU-2015:0180
- SUSE-SU-2015:0180
- openSUSE-SU-2015:0192
- openSUSE-SU-2015:0192
- http://packetstormsecurity.com/files/130972/Firefox-Proxy-Prototype-Privileged-Javascript-Injection.html
- http://packetstormsecurity.com/files/130972/Firefox-Proxy-Prototype-Privileged-Javascript-Injection.html
- 62242
- 62242
- 62250
- 62250
- 62418
- 62418
- 62446
- 62446
- 62790
- 62790
- http://www.mozilla.org/security/announce/2014/mfsa2015-09.html
- http://www.mozilla.org/security/announce/2014/mfsa2015-09.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 72041
- 72041
- 1031533
- 1031533
- https://bugzilla.mozilla.org/show_bug.cgi?id=987794
- https://bugzilla.mozilla.org/show_bug.cgi?id=987794
- https://community.rapid7.com/community/metasploit/blog/2015/03/23/r7-2015-04-disclosure-mozilla-firefox-proxy-prototype-rce-cve-2014-8636
- https://community.rapid7.com/community/metasploit/blog/2015/03/23/r7-2015-04-disclosure-mozilla-firefox-proxy-prototype-rce-cve-2014-8636
- firefox-cve20148636-sec-bypass(99964)
- firefox-cve20148636-sec-bypass(99964)
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-8637
Mozilla Firefox before 35.0 and SeaMonkey before 2.32 do not properly initialize memory for BMP images, which allows remote attackers to obtain sensitive information from process memory via a crafted web page that triggers the rendering of malformed BMP data within a CANVAS element.
- openSUSE-SU-2015:0077
- openSUSE-SU-2015:0077
- SUSE-SU-2015:0171
- SUSE-SU-2015:0171
- SUSE-SU-2015:0173
- SUSE-SU-2015:0173
- SUSE-SU-2015:0180
- SUSE-SU-2015:0180
- openSUSE-SU-2015:0192
- openSUSE-SU-2015:0192
- 62242
- 62242
- 62250
- 62250
- 62253
- 62253
- 62316
- 62316
- 62418
- 62418
- 62446
- 62446
- 62790
- 62790
- http://www.mozilla.org/security/announce/2014/mfsa2015-02.html
- http://www.mozilla.org/security/announce/2014/mfsa2015-02.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 72048
- 72048
- 1031533
- 1031533
- https://bugzilla.mozilla.org/show_bug.cgi?id=1094536
- https://bugzilla.mozilla.org/show_bug.cgi?id=1094536
- firefox-cve20148637-info-disc(99957)
- firefox-cve20148637-info-disc(99957)
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-8638
The navigator.sendBeacon implementation in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, Thunderbird before 31.4, and SeaMonkey before 2.32 omits the CORS Origin header, which allows remote attackers to bypass intended CORS access-control checks and conduct cross-site request forgery (CSRF) attacks via a crafted web site.
- http://linux.oracle.com/errata/ELSA-2015-0046.html
- http://linux.oracle.com/errata/ELSA-2015-0046.html
- http://linux.oracle.com/errata/ELSA-2015-0047.html
- http://linux.oracle.com/errata/ELSA-2015-0047.html
- openSUSE-SU-2015:0077
- openSUSE-SU-2015:0077
- SUSE-SU-2015:0171
- SUSE-SU-2015:0171
- SUSE-SU-2015:0173
- SUSE-SU-2015:0173
- SUSE-SU-2015:0180
- SUSE-SU-2015:0180
- openSUSE-SU-2015:0192
- openSUSE-SU-2015:0192
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:0133
- openSUSE-SU-2015:0133
- RHSA-2015:0046
- RHSA-2015:0046
- RHSA-2015:0047
- RHSA-2015:0047
- 62237
- 62237
- 62242
- 62242
- 62250
- 62250
- 62253
- 62253
- 62259
- 62259
- 62273
- 62273
- 62274
- 62274
- 62283
- 62283
- 62293
- 62293
- 62304
- 62304
- 62313
- 62313
- 62315
- 62315
- 62316
- 62316
- 62418
- 62418
- 62446
- 62446
- 62657
- 62657
- 62790
- 62790
- DSA-3127
- DSA-3127
- DSA-3132
- DSA-3132
- http://www.mozilla.org/security/announce/2014/mfsa2015-03.html
- http://www.mozilla.org/security/announce/2014/mfsa2015-03.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 72047
- 72047
- 1031533
- 1031533
- 1031534
- 1031534
- USN-2460-1
- USN-2460-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1080987
- https://bugzilla.mozilla.org/show_bug.cgi?id=1080987
- firefox-cve20148638-csrf(99958)
- firefox-cve20148638-csrf(99958)
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-8639
Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, Thunderbird before 31.4, and SeaMonkey before 2.32 do not properly interpret Set-Cookie headers within responses that have a 407 (aka Proxy Authentication Required) status code, which allows remote HTTP proxy servers to conduct session fixation attacks by providing a cookie name that corresponds to the session cookie of the origin server.
- http://linux.oracle.com/errata/ELSA-2015-0046.html
- http://linux.oracle.com/errata/ELSA-2015-0046.html
- http://linux.oracle.com/errata/ELSA-2015-0047.html
- http://linux.oracle.com/errata/ELSA-2015-0047.html
- openSUSE-SU-2015:0077
- openSUSE-SU-2015:0077
- SUSE-SU-2015:0171
- SUSE-SU-2015:0171
- SUSE-SU-2015:0173
- SUSE-SU-2015:0173
- SUSE-SU-2015:0180
- SUSE-SU-2015:0180
- openSUSE-SU-2015:0192
- openSUSE-SU-2015:0192
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:0133
- openSUSE-SU-2015:0133
- RHSA-2015:0046
- RHSA-2015:0046
- RHSA-2015:0047
- RHSA-2015:0047
- 62237
- 62237
- 62242
- 62242
- 62250
- 62250
- 62253
- 62253
- 62259
- 62259
- 62273
- 62273
- 62274
- 62274
- 62283
- 62283
- 62293
- 62293
- 62304
- 62304
- 62313
- 62313
- 62315
- 62315
- 62316
- 62316
- 62418
- 62418
- 62446
- 62446
- 62657
- 62657
- 62790
- 62790
- DSA-3127
- DSA-3127
- DSA-3132
- DSA-3132
- http://www.mozilla.org/security/announce/2014/mfsa2015-04.html
- http://www.mozilla.org/security/announce/2014/mfsa2015-04.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 72046
- 72046
- 1031533
- 1031533
- 1031534
- 1031534
- USN-2460-1
- USN-2460-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1095859
- https://bugzilla.mozilla.org/show_bug.cgi?id=1095859
- firefox-cve20148639-session-hijacking(99959)
- firefox-cve20148639-session-hijacking(99959)
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-8640
The mozilla::dom::AudioParamTimeline::AudioNodeInputValue function in the Web Audio API implementation in Mozilla Firefox before 35.0 and SeaMonkey before 2.32 does not properly restrict timeline operations, which allows remote attackers to cause a denial of service (uninitialized-memory read and application crash) via crafted API calls.
- openSUSE-SU-2015:0077
- openSUSE-SU-2015:0077
- SUSE-SU-2015:0171
- SUSE-SU-2015:0171
- SUSE-SU-2015:0173
- SUSE-SU-2015:0173
- SUSE-SU-2015:0180
- SUSE-SU-2015:0180
- openSUSE-SU-2015:0192
- openSUSE-SU-2015:0192
- 62242
- 62242
- 62250
- 62250
- 62418
- 62418
- 62790
- 62790
- http://www.mozilla.org/security/announce/2014/mfsa2015-05.html
- http://www.mozilla.org/security/announce/2014/mfsa2015-05.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 72045
- 72045
- 1031533
- 1031533
- https://bugzilla.mozilla.org/show_bug.cgi?id=1100409
- https://bugzilla.mozilla.org/show_bug.cgi?id=1100409
- firefox-cve20148640-info-disc(99960)
- firefox-cve20148640-info-disc(99960)
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-8641
Use-after-free vulnerability in the WebRTC implementation in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, and SeaMonkey before 2.32 allows remote attackers to execute arbitrary code via crafted track data.
- http://linux.oracle.com/errata/ELSA-2015-0046.html
- http://linux.oracle.com/errata/ELSA-2015-0046.html
- openSUSE-SU-2015:0077
- openSUSE-SU-2015:0077
- SUSE-SU-2015:0171
- SUSE-SU-2015:0171
- SUSE-SU-2015:0173
- SUSE-SU-2015:0173
- SUSE-SU-2015:0180
- SUSE-SU-2015:0180
- openSUSE-SU-2015:0192
- openSUSE-SU-2015:0192
- RHSA-2015:0046
- RHSA-2015:0046
- 62237
- 62237
- 62242
- 62242
- 62250
- 62250
- 62253
- 62253
- 62273
- 62273
- 62293
- 62293
- 62313
- 62313
- 62316
- 62316
- 62418
- 62418
- 62446
- 62446
- 62790
- 62790
- DSA-3127
- DSA-3127
- http://www.mozilla.org/security/announce/2014/mfsa2015-06.html
- http://www.mozilla.org/security/announce/2014/mfsa2015-06.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 72044
- 72044
- 1031533
- 1031533
- https://bugzilla.mozilla.org/show_bug.cgi?id=1108455
- https://bugzilla.mozilla.org/show_bug.cgi?id=1108455
- firefox-cve20148641-dos(99961)
- firefox-cve20148641-dos(99961)
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-8642
Mozilla Firefox before 35.0 and SeaMonkey before 2.32 do not consider the id-pkix-ocsp-nocheck extension in deciding whether to trust an OCSP responder, which makes it easier for remote attackers to obtain sensitive information by sniffing the network during a session in which there was an incorrect decision to accept a compromised and revoked certificate.
- openSUSE-SU-2015:0077
- openSUSE-SU-2015:0077
- openSUSE-SU-2015:0192
- openSUSE-SU-2015:0192
- 62242
- 62242
- 62250
- 62250
- 62253
- 62253
- 62316
- 62316
- 62418
- 62418
- 62446
- 62446
- 62790
- 62790
- http://www.mozilla.org/security/announce/2014/mfsa2015-08.html
- http://www.mozilla.org/security/announce/2014/mfsa2015-08.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 72042
- 72042
- 1031533
- 1031533
- https://bugzilla.mozilla.org/show_bug.cgi?id=1079658
- https://bugzilla.mozilla.org/show_bug.cgi?id=1079658
- firefox-cve20148642-sec-bypass(99963)
- firefox-cve20148642-sec-bypass(99963)
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2015-0799
The HTTP Alternative Services feature in Mozilla Firefox before 37.0.1 allows man-in-the-middle attackers to bypass an intended X.509 certificate-verification step for an SSL server by specifying that server in the uri-host field of an Alt-Svc HTTP/2 response header.
- openSUSE-SU-2015:0677
- openSUSE-SU-2015:0677
- http://www.mozilla.org/security/announce/2015/mfsa2015-44.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-44.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 1032030
- 1032030
- USN-2557-1
- USN-2557-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1148328
- https://bugzilla.mozilla.org/show_bug.cgi?id=1148328
- GLSA-201512-10
- GLSA-201512-10
Modified: 2024-11-21
CVE-2015-0801
Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 allow remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code with chrome privileges via vectors involving anchor navigation, a similar issue to CVE-2015-0818.
- openSUSE-SU-2015:0677
- openSUSE-SU-2015:0677
- SUSE-SU-2015:0704
- SUSE-SU-2015:0704
- openSUSE-SU-2015:0892
- openSUSE-SU-2015:0892
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:1266
- RHSA-2015:0766
- RHSA-2015:0766
- RHSA-2015:0771
- RHSA-2015:0771
- DSA-3211
- DSA-3211
- DSA-3212
- DSA-3212
- http://www.mozilla.org/security/announce/2015/mfsa2015-40.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-40.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 73455
- 73455
- 1031996
- 1031996
- 1032000
- 1032000
- USN-2550-1
- USN-2550-1
- USN-2552-1
- USN-2552-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1146339
- https://bugzilla.mozilla.org/show_bug.cgi?id=1146339
- GLSA-201512-10
- GLSA-201512-10
Modified: 2024-11-21
CVE-2015-0802
Mozilla Firefox before 37.0 relies on docshell type information instead of page principal information for Window.webidl access control, which might allow remote attackers to execute arbitrary JavaScript code with chrome privileges via certain content navigation that leverages the reachability of a privileged window with an unintended persistence of access to restricted internal methods.
- openSUSE-SU-2015:0677
- openSUSE-SU-2015:0677
- http://www.mozilla.org/security/announce/2015/mfsa2015-42.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-42.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 1031996
- 1031996
- USN-2550-1
- USN-2550-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1124898
- https://bugzilla.mozilla.org/show_bug.cgi?id=1124898
- GLSA-201512-10
- GLSA-201512-10
- 37958
- 37958
Modified: 2024-11-21
CVE-2015-0803
The HTMLSourceElement::AfterSetAttr function in Mozilla Firefox before 37.0 does not properly constrain the original data type of a casted value during the setting of a SOURCE element's attributes, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via a crafted HTML document.
- openSUSE-SU-2015:0677
- openSUSE-SU-2015:0677
- http://www.mozilla.org/security/announce/2015/mfsa2015-39.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-39.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 1031996
- 1031996
- USN-2550-1
- USN-2550-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1134561
- https://bugzilla.mozilla.org/show_bug.cgi?id=1134561
- GLSA-201512-10
- GLSA-201512-10
Modified: 2024-11-21
CVE-2015-0804
The HTMLSourceElement::BindToTree function in Mozilla Firefox before 37.0 does not properly constrain a data type after omitting namespace validation during certain tree-binding operations, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via a crafted HTML document containing a SOURCE element.
- openSUSE-SU-2015:0677
- openSUSE-SU-2015:0677
- http://www.mozilla.org/security/announce/2015/mfsa2015-39.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-39.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 1031996
- 1031996
- USN-2550-1
- USN-2550-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1134560
- https://bugzilla.mozilla.org/show_bug.cgi?id=1134560
- GLSA-201512-10
- GLSA-201512-10
Modified: 2024-11-21
CVE-2015-0805
The Off Main Thread Compositing (OMTC) implementation in Mozilla Firefox before 37.0 makes an incorrect memset call during interaction with the mozilla::layers::BufferTextureClient::AllocateForSurface function, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors that trigger rendering of 2D graphics content.
- openSUSE-SU-2015:0677
- openSUSE-SU-2015:0677
- http://www.mozilla.org/security/announce/2015/mfsa2015-38.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-38.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 1031996
- 1031996
- USN-2550-1
- USN-2550-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1135511
- https://bugzilla.mozilla.org/show_bug.cgi?id=1135511
- GLSA-201512-10
- GLSA-201512-10
Modified: 2024-11-21
CVE-2015-0806
The Off Main Thread Compositing (OMTC) implementation in Mozilla Firefox before 37.0 attempts to use memset for a memory region of negative length during interaction with the mozilla::layers::BufferTextureClient::AllocateForSurface function, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors that trigger rendering of 2D graphics content.
- openSUSE-SU-2015:0677
- openSUSE-SU-2015:0677
- http://www.mozilla.org/security/announce/2015/mfsa2015-38.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-38.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 1031996
- 1031996
- USN-2550-1
- USN-2550-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1099437
- https://bugzilla.mozilla.org/show_bug.cgi?id=1099437
- GLSA-201512-10
- GLSA-201512-10
Modified: 2024-11-21
CVE-2015-0807
The navigator.sendBeacon implementation in Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 processes HTTP 30x status codes for redirects after a preflight request has occurred, which allows remote attackers to bypass intended CORS access-control checks and conduct cross-site request forgery (CSRF) attacks via a crafted web site, a similar issue to CVE-2014-8638.
- openSUSE-SU-2015:0677
- openSUSE-SU-2015:0677
- SUSE-SU-2015:0704
- SUSE-SU-2015:0704
- openSUSE-SU-2015:0892
- openSUSE-SU-2015:0892
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:1266
- RHSA-2015:0766
- RHSA-2015:0766
- RHSA-2015:0771
- RHSA-2015:0771
- DSA-3211
- DSA-3211
- DSA-3212
- DSA-3212
- http://www.mozilla.org/security/announce/2015/mfsa2015-37.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-37.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 73457
- 73457
- 1031996
- 1031996
- 1032000
- 1032000
- USN-2550-1
- USN-2550-1
- USN-2552-1
- USN-2552-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1111834
- https://bugzilla.mozilla.org/show_bug.cgi?id=1111834
- GLSA-201512-10
- GLSA-201512-10
Modified: 2024-11-21
CVE-2015-0808
The webrtc::VPMContentAnalysis::Release function in the WebRTC implementation in Mozilla Firefox before 37.0 uses incompatible approaches to the deallocation of memory for simple-type arrays, which might allow remote attackers to cause a denial of service (memory corruption) via unspecified vectors.
- openSUSE-SU-2015:0677
- openSUSE-SU-2015:0677
- http://www.mozilla.org/security/announce/2015/mfsa2015-36.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-36.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 1031996
- 1031996
- USN-2550-1
- USN-2550-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1109552
- https://bugzilla.mozilla.org/show_bug.cgi?id=1109552
- GLSA-201512-10
- GLSA-201512-10
Modified: 2024-11-21
CVE-2015-0811
The QCMS implementation in Mozilla Firefox before 37.0 allows remote attackers to obtain sensitive information from process heap memory or cause a denial of service (out-of-bounds read) via an image that is improperly handled during transformation.
- openSUSE-SU-2015:0677
- openSUSE-SU-2015:0677
- http://www.mozilla.org/security/announce/2015/mfsa2015-34.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-34.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 1031996
- 1031996
- USN-2550-1
- USN-2550-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1132468
- https://bugzilla.mozilla.org/show_bug.cgi?id=1132468
- GLSA-201512-10
- GLSA-201512-10
Modified: 2024-11-21
CVE-2015-0815
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
- openSUSE-SU-2015:0677
- openSUSE-SU-2015:0677
- SUSE-SU-2015:0704
- SUSE-SU-2015:0704
- openSUSE-SU-2015:0892
- openSUSE-SU-2015:0892
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:1266
- RHSA-2015:0766
- RHSA-2015:0766
- RHSA-2015:0771
- RHSA-2015:0771
- DSA-3211
- DSA-3211
- DSA-3212
- DSA-3212
- http://www.mozilla.org/security/announce/2015/mfsa2015-30.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-30.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 73466
- 73466
- 1031996
- 1031996
- 1032000
- 1032000
- USN-2550-1
- USN-2550-1
- USN-2552-1
- USN-2552-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1036515
- https://bugzilla.mozilla.org/show_bug.cgi?id=1036515
- https://bugzilla.mozilla.org/show_bug.cgi?id=1137326
- https://bugzilla.mozilla.org/show_bug.cgi?id=1137326
- https://bugzilla.mozilla.org/show_bug.cgi?id=1138199
- https://bugzilla.mozilla.org/show_bug.cgi?id=1138199
- GLSA-201512-10
- GLSA-201512-10
Modified: 2024-11-21
CVE-2015-0816
Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 do not properly restrict resource: URLs, which makes it easier for remote attackers to execute arbitrary JavaScript code with chrome privileges by leveraging the ability to bypass the Same Origin Policy, as demonstrated by the resource: URL associated with PDF.js.
- openSUSE-SU-2015:0677
- openSUSE-SU-2015:0677
- SUSE-SU-2015:0704
- SUSE-SU-2015:0704
- openSUSE-SU-2015:0892
- openSUSE-SU-2015:0892
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:1266
- RHSA-2015:0766
- RHSA-2015:0766
- RHSA-2015:0771
- RHSA-2015:0771
- DSA-3211
- DSA-3211
- DSA-3212
- DSA-3212
- http://www.mozilla.org/security/announce/2015/mfsa2015-33.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-33.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 73461
- 73461
- 1031996
- 1031996
- 1032000
- 1032000
- USN-2550-1
- USN-2550-1
- USN-2552-1
- USN-2552-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1144991
- https://bugzilla.mozilla.org/show_bug.cgi?id=1144991
- GLSA-201512-10
- GLSA-201512-10
- 37958
- 37958
Modified: 2024-11-21
CVE-2015-0817
The asm.js implementation in Mozilla Firefox before 36.0.3, Firefox ESR 31.x before 31.5.2, and SeaMonkey before 2.33.1 does not properly determine the cases in which bounds checking may be safely skipped during JIT compilation and heap access, which allows remote attackers to read or write to unintended memory locations, and consequently execute arbitrary code, via crafted JavaScript.
- openSUSE-SU-2015:0567
- openSUSE-SU-2015:0567
- SUSE-SU-2015:0593
- SUSE-SU-2015:0593
- SUSE-SU-2015:0630
- SUSE-SU-2015:0630
- openSUSE-SU-2015:0636
- openSUSE-SU-2015:0636
- RHSA-2015:0718
- RHSA-2015:0718
- DSA-3201
- DSA-3201
- http://www.mozilla.org/security/announce/2015/mfsa2015-29.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-29.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 73263
- 73263
- 1031958
- 1031958
- USN-2538-1
- USN-2538-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1145255
- https://bugzilla.mozilla.org/show_bug.cgi?id=1145255
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2015-0818
Mozilla Firefox before 36.0.4, Firefox ESR 31.x before 31.5.3, and SeaMonkey before 2.33.1 allow remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code with chrome privileges via vectors involving SVG hash navigation.
- openSUSE-SU-2015:0567
- openSUSE-SU-2015:0567
- SUSE-SU-2015:0593
- SUSE-SU-2015:0593
- SUSE-SU-2015:0630
- SUSE-SU-2015:0630
- openSUSE-SU-2015:0636
- openSUSE-SU-2015:0636
- RHSA-2015:0718
- RHSA-2015:0718
- DSA-3201
- DSA-3201
- http://www.mozilla.org/security/announce/2015/mfsa2015-28.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-28.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 73265
- 73265
- 1031959
- 1031959
- USN-2538-1
- USN-2538-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1144988
- https://bugzilla.mozilla.org/show_bug.cgi?id=1144988
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2015-0819
The UITour::onPageEvent function in Mozilla Firefox before 36.0 does not ensure that an API call originates from a foreground tab, which allows remote attackers to conduct spoofing and clickjacking attacks by leveraging access to a UI Tour web site.
- openSUSE-SU-2015:0404
- openSUSE-SU-2015:0404
- openSUSE-SU-2015:0570
- openSUSE-SU-2015:0570
- http://www.mozilla.org/security/announce/2015/mfsa2015-26.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-26.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 72759
- 72759
- 1031791
- 1031791
- USN-2505-1
- USN-2505-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1079554
- https://bugzilla.mozilla.org/show_bug.cgi?id=1079554
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2015-0820
Mozilla Firefox before 36.0 does not properly restrict transitions of JavaScript objects from a non-extensible state to an extensible state, which allows remote attackers to bypass a Caja Compiler sandbox protection mechanism or a Secure EcmaScript sandbox protection mechanism via a crafted web site.
- openSUSE-SU-2015:0404
- openSUSE-SU-2015:0404
- openSUSE-SU-2015:0570
- openSUSE-SU-2015:0570
- http://www.mozilla.org/security/announce/2015/mfsa2015-27.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-27.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 72757
- 72757
- USN-2505-1
- USN-2505-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1125389
- https://bugzilla.mozilla.org/show_bug.cgi?id=1125389
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2015-0821
Mozilla Firefox before 36.0 allows user-assisted remote attackers to read arbitrary files or execute arbitrary JavaScript code with chrome privileges via a crafted web site that is accessed with unspecified mouse and keyboard actions.
- openSUSE-SU-2015:0404
- openSUSE-SU-2015:0404
- openSUSE-SU-2015:0570
- openSUSE-SU-2015:0570
- http://www.mozilla.org/security/announce/2015/mfsa2015-25.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-25.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 72758
- 72758
- 1031791
- 1031791
- USN-2505-1
- USN-2505-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1111960
- https://bugzilla.mozilla.org/show_bug.cgi?id=1111960
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2015-0822
The Form Autocompletion feature in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allows remote attackers to read arbitrary files via crafted JavaScript code.
- openSUSE-SU-2015:0404
- openSUSE-SU-2015:0404
- SUSE-SU-2015:0412
- SUSE-SU-2015:0412
- SUSE-SU-2015:0446
- SUSE-SU-2015:0446
- SUSE-SU-2015:0447
- SUSE-SU-2015:0447
- openSUSE-SU-2015:0448
- openSUSE-SU-2015:0448
- openSUSE-SU-2015:0567
- openSUSE-SU-2015:0567
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:0570
- openSUSE-SU-2015:0570
- RHSA-2015:0265
- RHSA-2015:0265
- RHSA-2015:0266
- RHSA-2015:0266
- RHSA-2015:0642
- RHSA-2015:0642
- DSA-3174
- DSA-3174
- DSA-3179
- DSA-3179
- http://www.mozilla.org/security/announce/2015/mfsa2015-24.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-24.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 72756
- 72756
- 1031791
- 1031791
- 1031792
- 1031792
- USN-2505-1
- USN-2505-1
- USN-2506-1
- USN-2506-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1110557
- https://bugzilla.mozilla.org/show_bug.cgi?id=1110557
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2015-0823
Multiple use-after-free vulnerabilities in OpenType Sanitiser, as used in Mozilla Firefox before 36.0, might allow remote attackers to trigger problematic Developer Console information or possibly have unspecified other impact by leveraging incorrect macro expansion, related to the ots::ots_gasp_parse function.
- openSUSE-SU-2015:0404
- openSUSE-SU-2015:0404
- openSUSE-SU-2015:0570
- openSUSE-SU-2015:0570
- http://www.mozilla.org/security/announce/2015/mfsa2015-23.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-23.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 72754
- 72754
- 1031791
- 1031791
- USN-2505-1
- USN-2505-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1098497
- https://bugzilla.mozilla.org/show_bug.cgi?id=1098497
- https://github.com/khaledhosny/ots/commit/003c62d28ae438aa8943cb31535563397f838a2c
- https://github.com/khaledhosny/ots/commit/003c62d28ae438aa8943cb31535563397f838a2c
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2015-0824
The mozilla::layers::BufferTextureClient::AllocateForSurface function in Mozilla Firefox before 36.0 allows remote attackers to cause a denial of service (out-of-bounds write of zero values, and application crash) via vectors that trigger use of DrawTarget and the Cairo library for image drawing.
- openSUSE-SU-2015:0404
- openSUSE-SU-2015:0404
- openSUSE-SU-2015:0570
- openSUSE-SU-2015:0570
- http://www.mozilla.org/security/announce/2015/mfsa2015-22.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-22.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 72753
- 72753
- 1031791
- 1031791
- USN-2505-1
- USN-2505-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1095925
- https://bugzilla.mozilla.org/show_bug.cgi?id=1095925
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2015-0825
Stack-based buffer underflow in the mozilla::MP3FrameParser::ParseBuffer function in Mozilla Firefox before 36.0 allows remote attackers to obtain sensitive information from process memory via a malformed MP3 file that improperly interacts with memory allocation during playback.
- openSUSE-SU-2015:0404
- openSUSE-SU-2015:0404
- openSUSE-SU-2015:0570
- openSUSE-SU-2015:0570
- http://www.mozilla.org/security/announce/2015/mfsa2015-21.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-21.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 72751
- 72751
- 1031791
- 1031791
- USN-2505-1
- USN-2505-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1092370
- https://bugzilla.mozilla.org/show_bug.cgi?id=1092370
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2015-0826
The nsTransformedTextRun::SetCapitalization function in Mozilla Firefox before 36.0 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read of heap memory) via a crafted Cascading Style Sheets (CSS) token sequence that triggers a restyle or reflow operation.
- openSUSE-SU-2015:0404
- openSUSE-SU-2015:0404
- openSUSE-SU-2015:0570
- openSUSE-SU-2015:0570
- http://www.mozilla.org/security/announce/2015/mfsa2015-20.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-20.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 72750
- 72750
- 1031791
- 1031791
- USN-2505-1
- USN-2505-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1092363
- https://bugzilla.mozilla.org/show_bug.cgi?id=1092363
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2015-0827
Heap-based buffer overflow in the mozilla::gfx::CopyRect function in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allows remote attackers to obtain sensitive information from uninitialized process memory via a malformed SVG graphic.
- openSUSE-SU-2015:0404
- openSUSE-SU-2015:0404
- SUSE-SU-2015:0412
- SUSE-SU-2015:0412
- SUSE-SU-2015:0446
- SUSE-SU-2015:0446
- SUSE-SU-2015:0447
- SUSE-SU-2015:0447
- openSUSE-SU-2015:0448
- openSUSE-SU-2015:0448
- openSUSE-SU-2015:0567
- openSUSE-SU-2015:0567
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:0570
- openSUSE-SU-2015:0570
- RHSA-2015:0265
- RHSA-2015:0265
- RHSA-2015:0266
- RHSA-2015:0266
- RHSA-2015:0642
- RHSA-2015:0642
- DSA-3174
- DSA-3174
- DSA-3179
- DSA-3179
- http://www.mozilla.org/security/announce/2015/mfsa2015-19.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-19.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 72755
- 72755
- 1031791
- 1031791
- 1031792
- 1031792
- USN-2505-1
- USN-2505-1
- USN-2506-1
- USN-2506-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1117304
- https://bugzilla.mozilla.org/show_bug.cgi?id=1117304
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2015-0828
Double free vulnerability in the nsXMLHttpRequest::GetResponse function in Mozilla Firefox before 36.0, when a nonstandard memory allocator is used, allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via crafted JavaScript code that makes an XMLHttpRequest call with zero bytes of data.
- openSUSE-SU-2015:0404
- openSUSE-SU-2015:0404
- openSUSE-SU-2015:0570
- openSUSE-SU-2015:0570
- http://www.mozilla.org/security/announce/2015/mfsa2015-18.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-18.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 72744
- 72744
- 1031791
- 1031791
- https://bugzilla.mozilla.org/show_bug.cgi?id=1030667
- https://bugzilla.mozilla.org/show_bug.cgi?id=1030667
- https://bugzilla.mozilla.org/show_bug.cgi?id=988675
- https://bugzilla.mozilla.org/show_bug.cgi?id=988675
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2015-0829
Buffer overflow in libstagefright in Mozilla Firefox before 36.0 allows remote attackers to execute arbitrary code via a crafted MP4 video that is improperly handled during playback.
- openSUSE-SU-2015:0404
- openSUSE-SU-2015:0404
- openSUSE-SU-2015:0570
- openSUSE-SU-2015:0570
- http://www.mozilla.org/security/announce/2015/mfsa2015-17.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-17.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 72741
- 72741
- 1031791
- 1031791
- USN-2505-1
- USN-2505-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1128939
- https://bugzilla.mozilla.org/show_bug.cgi?id=1128939
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2015-0830
The WebGL implementation in Mozilla Firefox before 36.0 does not properly allocate memory for copying an unspecified string to a shader's compilation log, which allows remote attackers to cause a denial of service (application crash) via crafted WebGL content.
- openSUSE-SU-2015:0404
- openSUSE-SU-2015:0404
- openSUSE-SU-2015:0570
- openSUSE-SU-2015:0570
- http://www.mozilla.org/security/announce/2015/mfsa2015-14.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-14.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 72745
- 72745
- 1031791
- 1031791
- USN-2505-1
- USN-2505-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1110488
- https://bugzilla.mozilla.org/show_bug.cgi?id=1110488
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2015-0831
Use-after-free vulnerability in the mozilla::dom::IndexedDB::IDBObjectStore::CreateIndex function in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via crafted content that is improperly handled during IndexedDB index creation.
- openSUSE-SU-2015:0404
- openSUSE-SU-2015:0404
- SUSE-SU-2015:0412
- SUSE-SU-2015:0412
- SUSE-SU-2015:0446
- SUSE-SU-2015:0446
- SUSE-SU-2015:0447
- SUSE-SU-2015:0447
- openSUSE-SU-2015:0448
- openSUSE-SU-2015:0448
- openSUSE-SU-2015:0567
- openSUSE-SU-2015:0567
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:0570
- openSUSE-SU-2015:0570
- RHSA-2015:0265
- RHSA-2015:0265
- RHSA-2015:0266
- RHSA-2015:0266
- RHSA-2015:0642
- RHSA-2015:0642
- DSA-3174
- DSA-3174
- DSA-3179
- DSA-3179
- http://www.mozilla.org/security/announce/2015/mfsa2015-16.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-16.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 72746
- 72746
- 1031791
- 1031791
- 1031792
- 1031792
- USN-2505-1
- USN-2505-1
- USN-2506-1
- USN-2506-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1130541
- https://bugzilla.mozilla.org/show_bug.cgi?id=1130541
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2015-0832
Mozilla Firefox before 36.0 does not properly recognize the equivalence of domain names with and without a trailing . (dot) character, which allows man-in-the-middle attackers to bypass the HPKP and HSTS protection mechanisms by constructing a URL with this character and leveraging access to an X.509 certificate for a domain with this character.
- openSUSE-SU-2015:0404
- openSUSE-SU-2015:0404
- openSUSE-SU-2015:0570
- openSUSE-SU-2015:0570
- http://www.mozilla.org/security/announce/2015/mfsa2015-13.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-13.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 72752
- 72752
- USN-2505-1
- USN-2505-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1065909
- https://bugzilla.mozilla.org/show_bug.cgi?id=1065909
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2015-0834
The WebRTC subsystem in Mozilla Firefox before 36.0 recognizes turns: and stuns: URIs but accesses the TURN or STUN server without using TLS, which makes it easier for man-in-the-middle attackers to discover credentials by spoofing a server and completing a brute-force attack within a short time window.
- openSUSE-SU-2015:0404
- openSUSE-SU-2015:0404
- openSUSE-SU-2015:0570
- openSUSE-SU-2015:0570
- http://www.mozilla.org/security/announce/2015/mfsa2015-15.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-15.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 72743
- 72743
- 1031791
- 1031791
- USN-2505-1
- USN-2505-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1098314
- https://bugzilla.mozilla.org/show_bug.cgi?id=1098314
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2015-0835
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 36.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
- openSUSE-SU-2015:0404
- openSUSE-SU-2015:0404
- SUSE-SU-2015:0412
- SUSE-SU-2015:0412
- SUSE-SU-2015:0446
- SUSE-SU-2015:0446
- SUSE-SU-2015:0447
- SUSE-SU-2015:0447
- openSUSE-SU-2015:0570
- openSUSE-SU-2015:0570
- http://www.mozilla.org/security/announce/2015/mfsa2015-11.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-11.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 72748
- 72748
- 1031791
- 1031791
- 1031792
- 1031792
- USN-2505-1
- USN-2505-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1072760
- https://bugzilla.mozilla.org/show_bug.cgi?id=1072760
- https://bugzilla.mozilla.org/show_bug.cgi?id=1092947
- https://bugzilla.mozilla.org/show_bug.cgi?id=1092947
- https://bugzilla.mozilla.org/show_bug.cgi?id=1114058
- https://bugzilla.mozilla.org/show_bug.cgi?id=1114058
- https://bugzilla.mozilla.org/show_bug.cgi?id=1114569
- https://bugzilla.mozilla.org/show_bug.cgi?id=1114569
- https://bugzilla.mozilla.org/show_bug.cgi?id=1118894
- https://bugzilla.mozilla.org/show_bug.cgi?id=1118894
- https://bugzilla.mozilla.org/show_bug.cgi?id=1119019
- https://bugzilla.mozilla.org/show_bug.cgi?id=1119019
- https://bugzilla.mozilla.org/show_bug.cgi?id=1122387
- https://bugzilla.mozilla.org/show_bug.cgi?id=1122387
- https://bugzilla.mozilla.org/show_bug.cgi?id=1125734
- https://bugzilla.mozilla.org/show_bug.cgi?id=1125734
- https://bugzilla.mozilla.org/show_bug.cgi?id=1127206
- https://bugzilla.mozilla.org/show_bug.cgi?id=1127206
- https://bugzilla.mozilla.org/show_bug.cgi?id=1127246
- https://bugzilla.mozilla.org/show_bug.cgi?id=1127246
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2015-0836
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
- openSUSE-SU-2015:0404
- openSUSE-SU-2015:0404
- SUSE-SU-2015:0412
- SUSE-SU-2015:0412
- SUSE-SU-2015:0446
- SUSE-SU-2015:0446
- SUSE-SU-2015:0447
- SUSE-SU-2015:0447
- openSUSE-SU-2015:0448
- openSUSE-SU-2015:0448
- openSUSE-SU-2015:0567
- openSUSE-SU-2015:0567
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:0570
- openSUSE-SU-2015:0570
- RHSA-2015:0265
- RHSA-2015:0265
- RHSA-2015:0266
- RHSA-2015:0266
- RHSA-2015:0642
- RHSA-2015:0642
- DSA-3174
- DSA-3174
- DSA-3179
- DSA-3179
- http://www.mozilla.org/security/announce/2015/mfsa2015-11.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-11.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 72742
- 72742
- 1031791
- 1031791
- 1031792
- 1031792
- USN-2505-1
- USN-2505-1
- USN-2506-1
- USN-2506-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1096138
- https://bugzilla.mozilla.org/show_bug.cgi?id=1096138
- https://bugzilla.mozilla.org/show_bug.cgi?id=1107009
- https://bugzilla.mozilla.org/show_bug.cgi?id=1107009
- https://bugzilla.mozilla.org/show_bug.cgi?id=1111243
- https://bugzilla.mozilla.org/show_bug.cgi?id=1111243
- https://bugzilla.mozilla.org/show_bug.cgi?id=1111248
- https://bugzilla.mozilla.org/show_bug.cgi?id=1111248
- https://bugzilla.mozilla.org/show_bug.cgi?id=1115776
- https://bugzilla.mozilla.org/show_bug.cgi?id=1115776
- https://bugzilla.mozilla.org/show_bug.cgi?id=1117406
- https://bugzilla.mozilla.org/show_bug.cgi?id=1117406
- https://bugzilla.mozilla.org/show_bug.cgi?id=1119579
- https://bugzilla.mozilla.org/show_bug.cgi?id=1119579
- https://bugzilla.mozilla.org/show_bug.cgi?id=1123882
- https://bugzilla.mozilla.org/show_bug.cgi?id=1123882
- https://bugzilla.mozilla.org/show_bug.cgi?id=1124018
- https://bugzilla.mozilla.org/show_bug.cgi?id=1124018
- https://bugzilla.mozilla.org/show_bug.cgi?id=1128196
- https://bugzilla.mozilla.org/show_bug.cgi?id=1128196
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2015-2706
Race condition in the AsyncPaintWaitEvent::AsyncPaintWaitEvent function in Mozilla Firefox before 37.0.2 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via a crafted plugin that does not properly complete initialization.
- openSUSE-SU-2015:0761
- openSUSE-SU-2015:0761
- openSUSE-SU-2015:0763
- openSUSE-SU-2015:0763
- http://www.mozilla.org/security/announce/2015/mfsa2015-45.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-45.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 74247
- 74247
- 1032171
- 1032171
- USN-2571-1
- USN-2571-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1141081
- https://bugzilla.mozilla.org/show_bug.cgi?id=1141081
- GLSA-201512-10
- GLSA-201512-10
Modified: 2024-11-21
CVE-2015-2708
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
- openSUSE-SU-2015:0892
- openSUSE-SU-2015:0892
- SUSE-SU-2015:0960
- SUSE-SU-2015:0960
- SUSE-SU-2015:0978
- SUSE-SU-2015:0978
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:0934
- openSUSE-SU-2015:0934
- RHSA-2015:0988
- RHSA-2015:0988
- RHSA-2015:1012
- RHSA-2015:1012
- DSA-3260
- DSA-3260
- DSA-3264
- DSA-3264
- http://www.mozilla.org/security/announce/2015/mfsa2015-46.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-46.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 74615
- 74615
- USN-2602-1
- USN-2602-1
- USN-2603-1
- USN-2603-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1120655
- https://bugzilla.mozilla.org/show_bug.cgi?id=1120655
- https://bugzilla.mozilla.org/show_bug.cgi?id=1143299
- https://bugzilla.mozilla.org/show_bug.cgi?id=1143299
- https://bugzilla.mozilla.org/show_bug.cgi?id=1151139
- https://bugzilla.mozilla.org/show_bug.cgi?id=1151139
- https://bugzilla.mozilla.org/show_bug.cgi?id=1152177
- https://bugzilla.mozilla.org/show_bug.cgi?id=1152177
- GLSA-201605-06
- GLSA-201605-06
- https://www.mozilla.org/en-US/security/known-vulnerabilities/thunderbird/#thunderbird31.7
- https://www.mozilla.org/en-US/security/known-vulnerabilities/thunderbird/#thunderbird31.7
Modified: 2024-11-21
CVE-2015-2709
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 38.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
- SUSE-SU-2015:0960
- SUSE-SU-2015:0960
- SUSE-SU-2015:0978
- SUSE-SU-2015:0978
- openSUSE-SU-2015:0934
- openSUSE-SU-2015:0934
- RHSA-2015:1012
- RHSA-2015:1012
- http://www.mozilla.org/security/announce/2015/mfsa2015-46.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-46.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 74615
- 74615
- USN-2602-1
- USN-2602-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1111251
- https://bugzilla.mozilla.org/show_bug.cgi?id=1111251
- https://bugzilla.mozilla.org/show_bug.cgi?id=1117977
- https://bugzilla.mozilla.org/show_bug.cgi?id=1117977
- https://bugzilla.mozilla.org/show_bug.cgi?id=1128064
- https://bugzilla.mozilla.org/show_bug.cgi?id=1128064
- https://bugzilla.mozilla.org/show_bug.cgi?id=1135066
- https://bugzilla.mozilla.org/show_bug.cgi?id=1135066
- https://bugzilla.mozilla.org/show_bug.cgi?id=1143194
- https://bugzilla.mozilla.org/show_bug.cgi?id=1143194
- https://bugzilla.mozilla.org/show_bug.cgi?id=1146101
- https://bugzilla.mozilla.org/show_bug.cgi?id=1146101
- https://bugzilla.mozilla.org/show_bug.cgi?id=1149526
- https://bugzilla.mozilla.org/show_bug.cgi?id=1149526
- https://bugzilla.mozilla.org/show_bug.cgi?id=1153688
- https://bugzilla.mozilla.org/show_bug.cgi?id=1153688
- https://bugzilla.mozilla.org/show_bug.cgi?id=1155474
- https://bugzilla.mozilla.org/show_bug.cgi?id=1155474
- GLSA-201605-06
- GLSA-201605-06
- https://www.mozilla.org/en-US/security/known-vulnerabilities/thunderbird/#thunderbird31.7
- https://www.mozilla.org/en-US/security/known-vulnerabilities/thunderbird/#thunderbird31.7
Modified: 2024-11-21
CVE-2015-2710
Heap-based buffer overflow in the SVGTextFrame class in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allows remote attackers to execute arbitrary code via crafted SVG graphics data in conjunction with a crafted Cascading Style Sheets (CSS) token sequence.
- openSUSE-SU-2015:0892
- openSUSE-SU-2015:0892
- SUSE-SU-2015:0960
- SUSE-SU-2015:0960
- SUSE-SU-2015:0978
- SUSE-SU-2015:0978
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:0934
- openSUSE-SU-2015:0934
- RHSA-2015:0988
- RHSA-2015:0988
- RHSA-2015:1012
- RHSA-2015:1012
- DSA-3260
- DSA-3260
- DSA-3264
- DSA-3264
- http://www.mozilla.org/security/announce/2015/mfsa2015-48.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-48.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 74611
- 74611
- USN-2602-1
- USN-2602-1
- USN-2603-1
- USN-2603-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1149542
- https://bugzilla.mozilla.org/show_bug.cgi?id=1149542
- GLSA-201605-06
- GLSA-201605-06
- https://www.mozilla.org/en-US/security/known-vulnerabilities/thunderbird/#thunderbird31.7
- https://www.mozilla.org/en-US/security/known-vulnerabilities/thunderbird/#thunderbird31.7
Modified: 2024-11-21
CVE-2015-2711
Mozilla Firefox before 38.0 does not recognize a referrer policy delivered by a referrer META element in cases of context-menu navigation and middle-click navigation, which allows remote attackers to obtain sensitive information by reading web-server Referer logs that contain private data in a URL, as demonstrated by a private path component.
- openSUSE-SU-2015:0934
- openSUSE-SU-2015:0934
- http://www.mozilla.org/security/announce/2015/mfsa2015-49.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-49.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 74611
- 74611
- USN-2602-1
- USN-2602-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1113431
- https://bugzilla.mozilla.org/show_bug.cgi?id=1113431
- GLSA-201605-06
- GLSA-201605-06
Modified: 2024-11-21
CVE-2015-2712
The asm.js implementation in Mozilla Firefox before 38.0 does not properly determine heap lengths during identification of cases in which bounds checking may be safely skipped, which allows remote attackers to trigger out-of-bounds write operations and possibly execute arbitrary code, or trigger out-of-bounds read operations and possibly obtain sensitive information from process memory, via crafted JavaScript.
- openSUSE-SU-2015:0934
- openSUSE-SU-2015:0934
- http://www.mozilla.org/security/announce/2015/mfsa2015-50.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-50.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 74611
- 74611
- USN-2602-1
- USN-2602-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1152280
- https://bugzilla.mozilla.org/show_bug.cgi?id=1152280
- GLSA-201605-06
- GLSA-201605-06
Modified: 2024-11-21
CVE-2015-2713
Use-after-free vulnerability in the SetBreaks function in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a document containing crafted text in conjunction with a Cascading Style Sheets (CSS) token sequence containing properties related to vertical text.
- openSUSE-SU-2015:0892
- openSUSE-SU-2015:0892
- SUSE-SU-2015:0960
- SUSE-SU-2015:0960
- SUSE-SU-2015:0978
- SUSE-SU-2015:0978
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:0934
- openSUSE-SU-2015:0934
- RHSA-2015:0988
- RHSA-2015:0988
- RHSA-2015:1012
- RHSA-2015:1012
- DSA-3260
- DSA-3260
- DSA-3264
- DSA-3264
- http://www.mozilla.org/security/announce/2015/mfsa2015-51.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-51.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 74611
- 74611
- USN-2602-1
- USN-2602-1
- USN-2603-1
- USN-2603-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1153478
- https://bugzilla.mozilla.org/show_bug.cgi?id=1153478
- GLSA-201605-06
- GLSA-201605-06
- https://www.mozilla.org/en-US/security/known-vulnerabilities/thunderbird/#thunderbird31.7
- https://www.mozilla.org/en-US/security/known-vulnerabilities/thunderbird/#thunderbird31.7
Modified: 2024-11-21
CVE-2015-2715
Race condition in the nsThreadManager::RegisterCurrentThread function in Mozilla Firefox before 38.0 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and heap memory corruption) by leveraging improper Media Decoder Thread creation at the time of a shutdown.
- openSUSE-SU-2015:0934
- openSUSE-SU-2015:0934
- http://www.mozilla.org/security/announce/2015/mfsa2015-53.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-53.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 74611
- 74611
- USN-2602-1
- USN-2602-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=988698
- https://bugzilla.mozilla.org/show_bug.cgi?id=988698
- GLSA-201605-06
- GLSA-201605-06
Modified: 2024-11-21
CVE-2015-2716
Buffer overflow in the XML parser in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allows remote attackers to execute arbitrary code by providing a large amount of compressed XML data, a related issue to CVE-2015-1283.
- openSUSE-SU-2015:0892
- openSUSE-SU-2015:0892
- SUSE-SU-2015:0960
- SUSE-SU-2015:0960
- SUSE-SU-2015:0978
- SUSE-SU-2015:0978
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:0934
- openSUSE-SU-2015:0934
- RHSA-2015:0988
- RHSA-2015:0988
- RHSA-2015:1012
- RHSA-2015:1012
- DSA-3260
- DSA-3260
- DSA-3264
- DSA-3264
- http://www.mozilla.org/security/announce/2015/mfsa2015-54.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-54.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 74611
- 74611
- USN-2602-1
- USN-2602-1
- USN-2603-1
- USN-2603-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1140537
- https://bugzilla.mozilla.org/show_bug.cgi?id=1140537
- https://hg.mozilla.org/releases/mozilla-esr31/rev/2f3e78643f5c
- https://hg.mozilla.org/releases/mozilla-esr31/rev/2f3e78643f5c
- https://kc.mcafee.com/corporate/index?page=content&id=SB10365
- https://kc.mcafee.com/corporate/index?page=content&id=SB10365
- GLSA-201605-06
- GLSA-201605-06
- https://www.mozilla.org/en-US/security/known-vulnerabilities/thunderbird/#thunderbird31.7
- https://www.mozilla.org/en-US/security/known-vulnerabilities/thunderbird/#thunderbird31.7
- https://www.tenable.com/security/tns-2016-20
- https://www.tenable.com/security/tns-2016-20
Modified: 2024-11-21
CVE-2015-2717
Integer overflow in libstagefright in Mozilla Firefox before 38.0 allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow and out-of-bounds read) via an MP4 video file containing invalid metadata.
- openSUSE-SU-2015:0934
- openSUSE-SU-2015:0934
- http://www.mozilla.org/security/announce/2015/mfsa2015-55.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-55.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 74611
- 74611
- USN-2602-1
- USN-2602-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1154683
- https://bugzilla.mozilla.org/show_bug.cgi?id=1154683
- GLSA-201605-06
- GLSA-201605-06
Modified: 2024-11-21
CVE-2015-2718
The WebChannel.jsm module in Mozilla Firefox before 38.0 allows remote attackers to bypass the Same Origin Policy and obtain sensitive webchannel-response data via a crafted web site containing an IFRAME element referencing a different web site that is intended to read this data.
- openSUSE-SU-2015:0934
- openSUSE-SU-2015:0934
- http://www.mozilla.org/security/announce/2015/mfsa2015-56.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-56.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 74611
- 74611
- USN-2602-1
- USN-2602-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1146724
- https://bugzilla.mozilla.org/show_bug.cgi?id=1146724
- GLSA-201605-06
- GLSA-201605-06
Modified: 2024-11-21
CVE-2015-2720
The update implementation in Mozilla Firefox before 38.0 on Windows does not ensure that the pathname for updater.exe corresponds to the application directory, which might allow local users to gain privileges via a Trojan horse file.
- http://www.mozilla.org/security/announce/2015/mfsa2015-58.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-58.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 74611
- 74611
- https://bugzilla.mozilla.org/show_bug.cgi?id=1127481
- https://bugzilla.mozilla.org/show_bug.cgi?id=1127481
Modified: 2024-11-21
CVE-2015-4496
Multiple integer overflows in libstagefright in Mozilla Firefox before 38.0 allow remote attackers to execute arbitrary code via crafted sample metadata in an MPEG-4 video file, a related issue to CVE-2015-1538.
- http://www.mozilla.org/security/announce/2015/mfsa2015-93.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-93.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=1149605
- https://bugzilla.mozilla.org/show_bug.cgi?id=1149605
- https://hg.mozilla.org/mozilla-central/rev/87277085561a
- https://hg.mozilla.org/mozilla-central/rev/87277085561a
No data currently available.
No data currently available.
No data currently available.
No data currently available.
No data currently available.
No data currently available.
No data currently available.
No data currently available.
No data currently available.
No data currently available.
No data currently available.
No data currently available.