Vulnerabilities > Mozilla > Seamonkey > Medium
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2015-01-14 | CVE-2014-8642 | Cryptographic Issues vulnerability in multiple products Mozilla Firefox before 35.0 and SeaMonkey before 2.32 do not consider the id-pkix-ocsp-nocheck extension in deciding whether to trust an OCSP responder, which makes it easier for remote attackers to obtain sensitive information by sniffing the network during a session in which there was an incorrect decision to accept a compromised and revoked certificate. | 4.3 |
2015-01-14 | CVE-2014-8640 | Race Condition vulnerability in multiple products The mozilla::dom::AudioParamTimeline::AudioNodeInputValue function in the Web Audio API implementation in Mozilla Firefox before 35.0 and SeaMonkey before 2.32 does not properly restrict timeline operations, which allows remote attackers to cause a denial of service (uninitialized-memory read and application crash) via crafted API calls. | 5.0 |
2015-01-14 | CVE-2014-8637 | Information Exposure vulnerability in Mozilla Firefox and Seamonkey Mozilla Firefox before 35.0 and SeaMonkey before 2.32 do not properly initialize memory for BMP images, which allows remote attackers to obtain sensitive information from process memory via a crafted web page that triggers the rendering of malformed BMP data within a CANVAS element. | 5.0 |
2014-12-11 | CVE-2014-8632 | Improper Access Control vulnerability in Mozilla Firefox and Seamonkey The structured-clone implementation in Mozilla Firefox before 34.0 and SeaMonkey before 2.31 does not properly interact with XrayWrapper property filtering, which allows remote attackers to bypass intended DOM object restrictions by leveraging property availability after XrayWrapper removal. | 4.3 |
2014-12-11 | CVE-2014-8631 | Improper Access Control vulnerability in Mozilla Firefox and Seamonkey The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 34.0 and SeaMonkey before 2.31 supports native-interface passing, which allows remote attackers to bypass intended DOM object restrictions via a call to an unspecified method. | 4.3 |
2014-12-11 | CVE-2014-1594 | Improper Input Validation vulnerability in Mozilla Firefox, Firefox ESR and Seamonkey Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 might allow remote attackers to execute arbitrary code by leveraging an incorrect cast from the BasicThebesLayer data type to the BasicContainerLayer data type. | 6.8 |
2014-12-11 | CVE-2014-1593 | Buffer Errors vulnerability in Mozilla Firefox, Firefox ESR and Seamonkey Stack-based buffer overflow in the mozilla::FileBlockCache::Read function in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to execute arbitrary code via crafted media content. | 6.8 |
2014-12-11 | CVE-2014-1592 | Use After Free Memory Corruption vulnerability in Mozilla Firefox, Firefox ESR and Seamonkey Use-after-free vulnerability in the nsHtml5TreeOperation function in xul.dll in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to execute arbitrary code by adding a second root element to an HTML5 document during parsing. network mozilla | 6.8 |
2014-12-11 | CVE-2014-1591 | Information Management Errors vulnerability in Mozilla Firefox and Seamonkey Mozilla Firefox 33.0 and SeaMonkey before 2.31 include path strings in CSP violation reports, which allows remote attackers to obtain sensitive information via a web site that receives a report after a redirect. | 4.3 |
2014-12-11 | CVE-2014-1590 | Improper Input Validation vulnerability in Mozilla Firefox, Firefox ESR and Seamonkey The XMLHttpRequest.prototype.send method in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to cause a denial of service (application crash) via a crafted JavaScript object. | 4.3 |