Vulnerabilities > Mozilla > Firefox > 2.0.0.7
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2015-05-14 | CVE-2015-2718 | Information Exposure vulnerability in multiple products The WebChannel.jsm module in Mozilla Firefox before 38.0 allows remote attackers to bypass the Same Origin Policy and obtain sensitive webchannel-response data via a crafted web site containing an IFRAME element referencing a different web site that is intended to read this data. | 4.3 |
2015-05-14 | CVE-2015-2717 | Numeric Errors vulnerability in multiple products Integer overflow in libstagefright in Mozilla Firefox before 38.0 allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow and out-of-bounds read) via an MP4 video file containing invalid metadata. | 6.8 |
2015-05-14 | CVE-2015-2715 | Race Condition vulnerability in multiple products Race condition in the nsThreadManager::RegisterCurrentThread function in Mozilla Firefox before 38.0 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and heap memory corruption) by leveraging improper Media Decoder Thread creation at the time of a shutdown. | 6.8 |
2015-05-14 | CVE-2015-2714 | Permissions, Privileges, and Access Controls vulnerability in Mozilla Firefox Mozilla Firefox before 38.0 on Android does not properly restrict writing URL data to the Android logging system, which allows attackers to obtain sensitive information via a crafted application that has a required permission for reading a log, as demonstrated by the READ_LOGS permission for the mixed-content violation log on Android 4.0 and earlier. | 2.1 |
2015-05-14 | CVE-2015-2712 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products The asm.js implementation in Mozilla Firefox before 38.0 does not properly determine heap lengths during identification of cases in which bounds checking may be safely skipped, which allows remote attackers to trigger out-of-bounds write operations and possibly execute arbitrary code, or trigger out-of-bounds read operations and possibly obtain sensitive information from process memory, via crafted JavaScript. | 7.5 |
2015-05-14 | CVE-2015-2711 | Information Exposure vulnerability in multiple products Mozilla Firefox before 38.0 does not recognize a referrer policy delivered by a referrer META element in cases of context-menu navigation and middle-click navigation, which allows remote attackers to obtain sensitive information by reading web-server Referer logs that contain private data in a URL, as demonstrated by a private path component. | 4.3 |
2015-04-27 | CVE-2015-2706 | Race Condition vulnerability in Mozilla Firefox Race condition in the AsyncPaintWaitEvent::AsyncPaintWaitEvent function in Mozilla Firefox before 37.0.2 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via a crafted plugin that does not properly complete initialization. | 6.8 |
2015-04-08 | CVE-2015-0799 | Improper Input Validation vulnerability in multiple products The HTTP Alternative Services feature in Mozilla Firefox before 37.0.1 allows man-in-the-middle attackers to bypass an intended X.509 certificate-verification step for an SSL server by specifying that server in the uri-host field of an Alt-Svc HTTP/2 response header. | 4.3 |
2015-04-08 | CVE-2015-0798 | Permissions, Privileges, and Access Controls vulnerability in multiple products The Reader mode feature in Mozilla Firefox before 37.0.1 on Android, and Desktop Firefox pre-release, does not properly handle privileged URLs, which makes it easier for remote attackers to execute arbitrary JavaScript code with chrome privileges by leveraging the ability to bypass the Same Origin Policy. | 5.0 |
2015-04-01 | CVE-2015-0816 | Permissions, Privileges, and Access Controls vulnerability in Mozilla Firefox, Firefox ESR and Thunderbird Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 do not properly restrict resource: URLs, which makes it easier for remote attackers to execute arbitrary JavaScript code with chrome privileges by leveraging the ability to bypass the Same Origin Policy, as demonstrated by the resource: URL associated with PDF.js. | 5.0 |