Vulnerabilities > Mozilla > Firefox > 20.0.1
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2015-07-06 | CVE-2015-2733 | Multiple Security vulnerability in Mozilla Firefox/Thunderbird Use-after-free vulnerability in the CanonicalizeXPCOMParticipant function in Mozilla Firefox before 39.0 and Firefox ESR 31.x before 31.8 and 38.x before 38.1 allows remote attackers to execute arbitrary code via vectors involving attachment of an XMLHttpRequest object to a dedicated worker. | 10.0 |
2015-07-06 | CVE-2015-2731 | Multiple Security vulnerability in Mozilla Firefox and Thunderbird Use-after-free vulnerability in the CSPService::ShouldLoad function in the microtask implementation in Mozilla Firefox before 39.0, Firefox ESR 38.x before 38.1, and Thunderbird before 38.1 allows remote attackers to execute arbitrary code by leveraging client-side JavaScript that triggers removal of a DOM object on the basis of a Content Policy. | 10.0 |
2015-07-06 | CVE-2015-2729 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Mozilla Firefox, Firefox ESR and Thunderbird The AudioParamTimeline::AudioNodeInputValue function in the Web Audio implementation in Mozilla Firefox before 39.0 and Firefox ESR 38.x before 38.1 does not properly calculate an oscillator rendering range, which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) via unspecified vectors. | 5.0 |
2015-07-06 | CVE-2015-2728 | Multiple Security vulnerability in Mozilla Firefox/Thunderbird The IndexedDatabaseManager class in the IndexedDB implementation in Mozilla Firefox before 39.0 and Firefox ESR 31.x before 31.8 and 38.x before 38.1 misinterprets an unspecified IDBDatabase field as a pointer, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via unspecified vectors, related to a "type confusion" issue. | 7.5 |
2015-05-14 | CVE-2015-2720 | Code vulnerability in Mozilla Firefox The update implementation in Mozilla Firefox before 38.0 on Windows does not ensure that the pathname for updater.exe corresponds to the application directory, which might allow local users to gain privileges via a Trojan horse file. | 4.4 |
2015-05-14 | CVE-2015-2718 | Information Exposure vulnerability in multiple products The WebChannel.jsm module in Mozilla Firefox before 38.0 allows remote attackers to bypass the Same Origin Policy and obtain sensitive webchannel-response data via a crafted web site containing an IFRAME element referencing a different web site that is intended to read this data. | 4.3 |
2015-05-14 | CVE-2015-2717 | Numeric Errors vulnerability in multiple products Integer overflow in libstagefright in Mozilla Firefox before 38.0 allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow and out-of-bounds read) via an MP4 video file containing invalid metadata. | 6.8 |
2015-05-14 | CVE-2015-2715 | Race Condition vulnerability in multiple products Race condition in the nsThreadManager::RegisterCurrentThread function in Mozilla Firefox before 38.0 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and heap memory corruption) by leveraging improper Media Decoder Thread creation at the time of a shutdown. | 6.8 |
2015-05-14 | CVE-2015-2714 | Permissions, Privileges, and Access Controls vulnerability in Mozilla Firefox Mozilla Firefox before 38.0 on Android does not properly restrict writing URL data to the Android logging system, which allows attackers to obtain sensitive information via a crafted application that has a required permission for reading a log, as demonstrated by the READ_LOGS permission for the mixed-content violation log on Android 4.0 and earlier. | 2.1 |
2015-05-14 | CVE-2015-2712 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products The asm.js implementation in Mozilla Firefox before 38.0 does not properly determine heap lengths during identification of cases in which bounds checking may be safely skipped, which allows remote attackers to trigger out-of-bounds write operations and possibly execute arbitrary code, or trigger out-of-bounds read operations and possibly obtain sensitive information from process memory, via crafted JavaScript. | 7.5 |