Vulnerabilities > Canonical

DATE CVE VULNERABILITY TITLE RISK
2015-04-13 CVE-2015-0840 Improper Access Control vulnerability in multiple products
The dpkg-source command in Debian dpkg before 1.16.16 and 1.17.x before 1.17.25 allows remote attackers to bypass signature verification via a crafted Debian source control file (.dsc).
4.3
2015-04-08 CVE-2015-1317 Use-after-free vulnerability in Oxide before 1.5.6 and 1.6.x before 1.6.1 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code by deleting all WebContents while a RenderProcessHost instance still exists.
network
low complexity
canonical oxide-project
7.5
2015-04-08 CVE-2015-0799 Improper Input Validation vulnerability in multiple products
The HTTP Alternative Services feature in Mozilla Firefox before 37.0.1 allows man-in-the-middle attackers to bypass an intended X.509 certificate-verification step for an SSL server by specifying that server in the uri-host field of an Alt-Svc HTTP/2 response header.
4.3
2015-04-01 CVE-2015-2756 Permissions, Privileges, and Access Controls vulnerability in multiple products
QEMU, as used in Xen 3.3.x through 4.5.x, does not properly restrict access to PCI command registers, which might allow local HVM guest users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.
local
low complexity
debian xen fedoraproject canonical CWE-264
4.9
2015-04-01 CVE-2015-0812 Code vulnerability in multiple products
Mozilla Firefox before 37.0 does not require an HTTPS session for lightweight theme add-on installations, which allows man-in-the-middle attackers to bypass an intended user-confirmation requirement by deploying a crafted web site and conducting a DNS spoofing attack against a mozilla.org subdomain.
4.3
2015-04-01 CVE-2015-0811 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products
The QCMS implementation in Mozilla Firefox before 37.0 allows remote attackers to obtain sensitive information from process heap memory or cause a denial of service (out-of-bounds read) via an image that is improperly handled during transformation.
network
low complexity
mozilla opensuse canonical CWE-119
6.4
2015-04-01 CVE-2015-0808 Code vulnerability in multiple products
The webrtc::VPMContentAnalysis::Release function in the WebRTC implementation in Mozilla Firefox before 37.0 uses incompatible approaches to the deallocation of memory for simple-type arrays, which might allow remote attackers to cause a denial of service (memory corruption) via unspecified vectors.
network
low complexity
opensuse canonical mozilla CWE-17
5.0
2015-04-01 CVE-2015-0806 Code vulnerability in multiple products
The Off Main Thread Compositing (OMTC) implementation in Mozilla Firefox before 37.0 attempts to use memset for a memory region of negative length during interaction with the mozilla::layers::BufferTextureClient::AllocateForSurface function, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors that trigger rendering of 2D graphics content.
network
low complexity
canonical mozilla opensuse CWE-17
7.5
2015-04-01 CVE-2015-0805 Code vulnerability in multiple products
The Off Main Thread Compositing (OMTC) implementation in Mozilla Firefox before 37.0 makes an incorrect memset call during interaction with the mozilla::layers::BufferTextureClient::AllocateForSurface function, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors that trigger rendering of 2D graphics content.
network
low complexity
opensuse mozilla canonical CWE-17
7.5
2015-04-01 CVE-2015-0804 Permissions, Privileges, and Access Controls vulnerability in multiple products
The HTMLSourceElement::BindToTree function in Mozilla Firefox before 37.0 does not properly constrain a data type after omitting namespace validation during certain tree-binding operations, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via a crafted HTML document containing a SOURCE element.
network
low complexity
mozilla opensuse canonical CWE-264
7.5