Vulnerabilities > Mozilla > Firefox > 32.0.2

DATE CVE VULNERABILITY TITLE RISK
2014-12-11 CVE-2014-1589 Improper Access Control vulnerability in Mozilla Firefox and Seamonkey
Mozilla Firefox before 34.0 and SeaMonkey before 2.31 provide stylesheets with an incorrect primary namespace, which allows remote attackers to bypass intended access restrictions via an XBL binding.
network
mozilla CWE-284
6.8
2014-12-11 CVE-2014-1588 Memory Corruption vulnerability in Mozilla Firefox/Thunderbird
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 34.0 and SeaMonkey before 2.31 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
network
mozilla
6.8
2014-12-11 CVE-2014-1587 Improper Input Validation vulnerability in Mozilla Firefox, Firefox ESR and Seamonkey
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
network
mozilla CWE-20
6.8
2014-09-25 CVE-2014-1568 Cryptographic Issues vulnerability in Google Chrome
Mozilla Network Security Services (NSS) before 3.16.2.1, 3.16.x before 3.16.5, and 3.17.x before 3.17.1, as used in Mozilla Firefox before 32.0.3, Mozilla Firefox ESR 24.x before 24.8.1 and 31.x before 31.1.1, Mozilla Thunderbird before 24.8.1 and 31.x before 31.1.2, Mozilla SeaMonkey before 2.29.1, Google Chrome before 37.0.2062.124 on Windows and OS X, and Google Chrome OS before 37.0.2062.120, does not properly parse ASN.1 values in X.509 certificates, which makes it easier for remote attackers to spoof RSA signatures via a crafted certificate, aka a "signature malleability" issue.
network
low complexity
google apple microsoft mozilla CWE-310
7.5
2012-05-01 CVE-2011-3079 Resource Management Errors vulnerability in multiple products
The Inter-process Communication (IPC) implementation in Google Chrome before 18.0.1025.168, as used in Mozilla Firefox before 38.0 and other products, does not properly validate messages, which has unspecified impact and attack vectors.
network
low complexity
opensuse google mozilla CWE-399
critical
10.0