Vulnerabilities > Oracle

DATE CVE VULNERABILITY TITLE RISK
2015-07-14 CVE-2015-5144 Improper Input Validation vulnerability in multiple products
Django before 1.4.21, 1.5.x through 1.6.x, 1.7.x before 1.7.9, and 1.8.x before 1.8.3 uses an incorrect regular expression, which allows remote attackers to inject arbitrary headers and conduct HTTP response splitting attacks via a newline character in an (1) email message to the EmailValidator, a (2) URL to the URLValidator, or unspecified vectors to the (3) validate_ipv4_address or (4) validate_slug validator.
4.3
2015-07-14 CVE-2015-5143 Resource Management Errors vulnerability in multiple products
The session backends in Django before 1.4.21, 1.5.x through 1.6.x, 1.7.x before 1.7.9, and 1.8.x before 1.8.3 allows remote attackers to cause a denial of service (session store consumption) via multiple requests with unique session keys.
network
low complexity
djangoproject debian oracle canonical CWE-399
7.8
2015-07-09 CVE-2015-1793 7PK - Security Features vulnerability in multiple products
The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certificate verifications via a valid leaf certificate.
network
low complexity
oracle openssl CWE-254
6.5
2015-07-06 CVE-2015-2742 Information Exposure vulnerability in multiple products
Mozilla Firefox before 39.0 on OS X includes native key press information during the logging of crashes, which allows remote attackers to obtain sensitive information by leveraging access to a crash-reporting data stream.
4.3
2015-07-06 CVE-2015-2741 Cryptographic Issues vulnerability in multiple products
Mozilla Firefox before 39.0, Firefox ESR 38.x before 38.1, and Thunderbird before 38.1 do not enforce key pinning upon encountering an X.509 certificate problem that generates a user dialog, which allows user-assisted man-in-the-middle attackers to bypass intended access restrictions by triggering a (1) expired certificate or (2) mismatched hostname for a domain with pinning enabled.
4.3
2015-07-06 CVE-2015-2738 Code vulnerability in multiple products
The YCbCrImageDataDeserializer::ToDataSourceSurface function in the YCbCr implementation in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 reads data from uninitialized memory locations, which has unspecified impact and attack vectors.
network
low complexity
canonical suse debian mozilla oracle CWE-17
critical
10.0
2015-07-06 CVE-2015-2737 Code vulnerability in multiple products
The rx::d3d11::SetBufferData function in the Direct3D 11 implementation in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 reads data from uninitialized memory locations, which has unspecified impact and attack vectors.
network
low complexity
mozilla canonical oracle suse debian CWE-17
critical
10.0
2015-07-06 CVE-2015-2734 Code vulnerability in multiple products
The CairoTextureClientD3D9::BorrowDrawTarget function in the Direct3D 9 implementation in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 reads data from uninitialized memory locations, which has unspecified impact and attack vectors.
network
low complexity
suse mozilla canonical debian oracle CWE-17
critical
10.0
2015-07-06 CVE-2015-2733 Multiple Security vulnerability in Mozilla Firefox/Thunderbird
Use-after-free vulnerability in the CanonicalizeXPCOMParticipant function in Mozilla Firefox before 39.0 and Firefox ESR 31.x before 31.8 and 38.x before 38.1 allows remote attackers to execute arbitrary code via vectors involving attachment of an XMLHttpRequest object to a dedicated worker.
network
low complexity
mozilla oracle novell
critical
10.0
2015-07-06 CVE-2015-2731 Multiple Security vulnerability in Mozilla Firefox and Thunderbird
Use-after-free vulnerability in the CSPService::ShouldLoad function in the microtask implementation in Mozilla Firefox before 39.0, Firefox ESR 38.x before 38.1, and Thunderbird before 38.1 allows remote attackers to execute arbitrary code by leveraging client-side JavaScript that triggers removal of a DOM object on the basis of a Content Policy.
network
low complexity
mozilla oracle
critical
10.0