Vulnerabilities > Mozilla > Firefox > 36.0.3

DATE CVE VULNERABILITY TITLE RISK
2015-04-01 CVE-2015-0802 Permissions, Privileges, and Access Controls vulnerability in multiple products
Mozilla Firefox before 37.0 relies on docshell type information instead of page principal information for Window.webidl access control, which might allow remote attackers to execute arbitrary JavaScript code with chrome privileges via certain content navigation that leverages the reachability of a privileged window with an unintended persistence of access to restricted internal methods.
network
low complexity
opensuse canonical mozilla CWE-264
5.0
2015-04-01 CVE-2015-0801 Permissions, Privileges, and Access Controls vulnerability in Mozilla Firefox, Firefox ESR and Thunderbird
Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 allow remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code with chrome privileges via vectors involving anchor navigation, a similar issue to CVE-2015-0818.
network
low complexity
mozilla CWE-264
7.5
2015-04-01 CVE-2015-0800 Information Exposure vulnerability in Mozilla Firefox
The PRNG implementation in the DNS resolver in Mozilla Firefox (aka Fennec) before 37.0 on Android does not properly generate random numbers for query ID values and UDP source ports, which makes it easier for remote attackers to spoof DNS responses by guessing these numbers, a related issue to CVE-2012-2808.
network
low complexity
mozilla google CWE-200
5.0
2015-03-24 CVE-2015-0818 Permissions, Privileges, and Access Controls vulnerability in Mozilla Firefox, Firefox ESR and Seamonkey
Mozilla Firefox before 36.0.4, Firefox ESR 31.x before 31.5.3, and SeaMonkey before 2.33.1 allow remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code with chrome privileges via vectors involving SVG hash navigation.
network
low complexity
mozilla CWE-264
7.5
2012-05-01 CVE-2011-3079 Resource Management Errors vulnerability in multiple products
The Inter-process Communication (IPC) implementation in Google Chrome before 18.0.1025.168, as used in Mozilla Firefox before 38.0 and other products, does not properly validate messages, which has unspecified impact and attack vectors.
network
low complexity
opensuse google mozilla CWE-399
critical
10.0