Vulnerabilities > Critical

DATE CVE VULNERABILITY TITLE RISK
2014-07-23 CVE-2014-3939 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Autodesk Sketchbook PRO 6.2.4/6.2.5
Heap-based buffer overflow in Autodesk SketchBook Pro before 6.2.6 allows remote attackers to execute arbitrary code via crafted layer bitmap data in a PXD file.
network
autodesk CWE-119
critical
9.3
2014-07-23 CVE-2014-3938 Numeric Errors vulnerability in Autodesk Sketchbook PRO 6.2.4/6.2.5
Integer overflow in Autodesk SketchBook Pro before 6.2.6 allows remote attackers to execute arbitrary code via crafted layer mask data in a PSD file, which triggers a heap-based buffer overflow.
network
autodesk CWE-189
critical
9.3
2014-07-23 CVE-2014-1557 Code Injection vulnerability in multiple products
The ConvolveHorizontally function in Skia, as used in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7, does not properly handle the discarding of image data during function execution, which allows remote attackers to execute arbitrary code by triggering prolonged image scaling, as demonstrated by scaling of a high-quality image.
network
oracle mozilla debian CWE-94
critical
9.3
2014-07-23 CVE-2014-1556 Code Injection vulnerability in Mozilla Firefox, Firefox ESR and Thunderbird
Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 allow remote attackers to execute arbitrary code via crafted WebGL content constructed with the Cesium JavaScript library.
network
mozilla CWE-94
critical
9.3
2014-07-23 CVE-2014-1555 Use After Free Memory Corruption vulnerability in Mozilla Firefox, Firefox ESR and Thunderbird
Use-after-free vulnerability in the nsDocLoader::OnProgress function in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 allows remote attackers to execute arbitrary code via vectors that trigger a FireOnStateChange event.
network
mozilla
critical
9.3
2014-07-23 CVE-2014-1551 Use After Free Memory Corruption vulnerability in Mozilla Firefox, Firefox ESR and Thunderbird
Use-after-free vulnerability in the FontTableRec destructor in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 on Windows allows remote attackers to execute arbitrary code via crafted use of fonts in MathML content, leading to improper handling of a DirectWrite font-face object.
network
low complexity
mozilla microsoft
critical
10.0
2014-07-23 CVE-2014-1550 Use After Free Memory Corruption vulnerability in Mozilla Firefox and Thunderbird
Use-after-free vulnerability in the MediaInputPort class in Mozilla Firefox before 31.0 and Thunderbird before 31.0 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by leveraging incorrect Web Audio control-message ordering.
network
low complexity
mozilla
critical
10.0
2014-07-23 CVE-2014-1549 Buffer Errors vulnerability in Mozilla Firefox and Thunderbird
The mozilla::dom::AudioBufferSourceNodeEngine::CopyFromInputBuffer function in Mozilla Firefox before 31.0 and Thunderbird before 31.0 does not properly allocate Web Audio buffer memory, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via crafted audio content that is improperly handled during playback buffering.
network
mozilla CWE-119
critical
9.3
2014-07-23 CVE-2014-1548 Memory Corruption vulnerability in Mozilla Firefox and Thunderbird
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 31.0 and Thunderbird before 31.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
network
low complexity
mozilla
critical
10.0
2014-07-23 CVE-2014-1547 Memory Corruption vulnerability in Mozilla Firefox, Firefox ESR and Thunderbird
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
network
low complexity
mozilla
critical
10.0