Vulnerabilities

DATE CVE VULNERABILITY TITLE RISK
2016-08-05 CVE-2016-5250 Information Exposure vulnerability in Mozilla Firefox
Mozilla Firefox before 48.0, Firefox ESR < 45.4 and Thunderbird < 45.4 allow remote attackers to obtain sensitive information about the previously retrieved page via Resource Timing API calls.
network
low complexity
mozilla CWE-200
4.3
2016-08-05 CVE-2016-2839 Improper Input Validation vulnerability in Mozilla Firefox
Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 on Linux make cairo _cairo_surface_get_extents calls that do not properly interact with libav header allocation in FFmpeg 0.10, which allows remote attackers to cause a denial of service (application crash) via a crafted video.
network
low complexity
mozilla CWE-20
6.5
2016-08-05 CVE-2016-2838 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Mozilla Firefox
Heap-based buffer overflow in the nsBidi::BracketData::AddOpening function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code via directional content in an SVG document.
network
low complexity
mozilla CWE-119
8.8
2016-08-05 CVE-2016-2837 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products
Heap-based buffer overflow in the ClearKey Content Decryption Module (CDM) in the Encrypted Media Extensions (EME) API in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 might allow remote attackers to execute arbitrary code by providing a malformed video and leveraging a Gecko Media Plugin (GMP) sandbox bypass.
network
low complexity
mozilla oracle CWE-119
6.3
2016-08-05 CVE-2016-2836 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Mozilla Firefox
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to Http2Session::Shutdown and SpdySession31::Shutdown, and other vectors.
network
low complexity
mozilla CWE-119
8.8
2016-08-05 CVE-2016-2835 Unspecified vulnerability in Mozilla Firefox
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 48.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
network
low complexity
mozilla
8.8
2016-08-05 CVE-2016-2830 Information Exposure vulnerability in Mozilla Firefox
Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 preserve the network connection used for favicon resource retrieval after the associated browser window is closed, which makes it easier for remote web servers to track users by observing network traffic from multiple IP addresses.
network
low complexity
mozilla CWE-200
4.3
2016-08-03 CVE-2016-5671 Cross-Site Request Forgery (CSRF) vulnerability in Crestron Dm-Txrx-100-Str Firmware 1.2866.00026
Multiple cross-site request forgery (CSRF) vulnerabilities on Crestron Electronics DM-TXRX-100-STR devices with firmware through 1.3039.00040 allow remote attackers to hijack the authentication of arbitrary users.
network
low complexity
crestron CWE-352
8.8
2016-08-03 CVE-2016-5670 Credentials Management vulnerability in Crestron Dm-Txrx-100-Str Firmware 1.2866.00026
Crestron Electronics DM-TXRX-100-STR devices with firmware before 1.3039.00040 have a hardcoded password of admin for the admin account, which makes it easier for remote attackers to obtain access via the web management interface.
network
low complexity
crestron CWE-255
critical
9.8
2016-08-03 CVE-2016-5669 Unspecified vulnerability in Crestron Dm-Txrx-100-Str Firmware 1.2866.00026
Crestron Electronics DM-TXRX-100-STR devices with firmware before 1.3039.00040 use a hardcoded 0xb9eed4d955a59eb3 X.509 certificate from an OpenSSL Test Certification Authority, which makes it easier for remote attackers to conduct man-in-the-middle attacks against HTTPS sessions by leveraging the certificate's trust relationship.
network
low complexity
crestron
critical
9.8