Vulnerabilities > Oracle > Solaris > 11.3
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2014-03-19 | CVE-2014-1504 | Permissions, Privileges, and Access Controls vulnerability in multiple products The session-restore feature in Mozilla Firefox before 28.0 and SeaMonkey before 2.25 does not consider the Content Security Policy of a data: URL, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted document that is accessed after a browser restart. | 2.6 |
2014-03-19 | CVE-2014-1502 | Origin Validation Error vulnerability in multiple products The (1) WebGL.compressedTexImage2D and (2) WebGL.compressedTexSubImage2D functions in Mozilla Firefox before 28.0 and SeaMonkey before 2.25 allow remote attackers to bypass the Same Origin Policy and render content in a different domain via unspecified vectors. | 6.8 |
2014-03-19 | CVE-2014-1501 | Permissions, Privileges, and Access Controls vulnerability in multiple products Mozilla Firefox before 28.0 on Android allows remote attackers to bypass the Same Origin Policy and access arbitrary file: URLs via vectors involving the "Open Link in New Tab" menu selection. | 5.8 |
2014-03-19 | CVE-2014-1500 | Resource Exhaustion vulnerability in multiple products Mozilla Firefox before 28.0 and SeaMonkey before 2.25 allow remote attackers to cause a denial of service (resource consumption and application hang) via onbeforeunload events that trigger background JavaScript execution. | 5.0 |
2014-03-19 | CVE-2014-1499 | Mozilla Firefox before 28.0 and SeaMonkey before 2.25 allow remote attackers to spoof the domain name in the WebRTC (1) camera or (2) microphone permission prompt by triggering navigation at a certain time during generation of this prompt. | 4.3 |
2014-03-19 | CVE-2014-1498 | Improper Verification of Cryptographic Signature vulnerability in multiple products The crypto.generateCRMFRequest method in Mozilla Firefox before 28.0 and SeaMonkey before 2.25 does not properly validate a certain key type, which allows remote attackers to cause a denial of service (application crash) via vectors that trigger generation of a key that supports the Elliptic Curve ec-dual-use algorithm. | 5.0 |
2014-03-19 | CVE-2014-1494 | Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 28.0 and SeaMonkey before 2.25 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. | 9.3 |
2014-02-06 | CVE-2014-1489 | Permissions, Privileges, and Access Controls vulnerability in multiple products Mozilla Firefox before 27.0 does not properly restrict access to about:home buttons by script on other pages, which allows user-assisted remote attackers to cause a denial of service (session restore) via a crafted web site. | 4.3 |
2014-02-06 | CVE-2014-1484 | Information Exposure vulnerability in multiple products Mozilla Firefox before 27.0 on Android 4.2 and earlier creates system-log entries containing profile paths, which allows attackers to obtain sensitive information via a crafted application. | 5.0 |
2014-02-06 | CVE-2014-1480 | Improper Restriction of Rendered UI Layers OR Frames vulnerability in multiple products The file-download implementation in Mozilla Firefox before 27.0 and SeaMonkey before 2.24 does not properly restrict the timing of button selections, which allows remote attackers to conduct clickjacking attacks, and trigger unintended launching of a downloaded file, via a crafted web site. | 4.3 |