Beschreibung
Multiple serious vulnerabilities have been found in Mozilla products. Malicious users can exploit these vulnerabilities to bypass security restrictions, cause denial of service, execute arbitrary code or obtain sensitive information.
Below is a complete list of vulnerabilities
- Multiple memory bugs can be exploited remotely via vectors related to browser engine;
- Error while fixing previous vulnerabilities can be exploited remotely via specially designed URL;
- Improper IDBDatabase handling can be exploited remotely via an unknown vectors;
- Out-of-bound read can be exploited via vectors related to web audio, specially designed XMLHttpRequest object and DOM objects manipulations;
- Uninitialized memory usage can be exploited remotely via an unknown vectors;
- Lack of certificates override restrictions can be exploited remotely via making user to override certificate;
- Recording keystrokes that triggered errors can be exploited remotely via crash reports from OS X;
- An unknown vulnerability in PDF.js can be exploited remotely via a specially designed PDF;
- Multiple TLS vulnerabilities can be exploited remotely via an unknown vectors.
Ursprüngliche Informationshinweise
CVE Liste
- CVE-2015-2731 critical
- CVE-2015-2734 critical
- CVE-2015-2742 critical
- CVE-2015-2739 critical
- CVE-2015-2738 critical
- CVE-2015-2735 critical
- CVE-2015-2743 critical
- CVE-2015-2721 critical
- CVE-2015-2730 critical
- CVE-2015-2740 critical
- CVE-2015-2741 critical
- CVE-2015-2728 critical
- CVE-2015-2727 critical
- CVE-2015-2725 critical
- CVE-2015-2726 critical
- CVE-2015-2733 critical
- CVE-2015-2724 critical
- CVE-2015-2729 critical
- CVE-2015-2722 critical
- CVE-2015-2737 critical
- CVE-2015-2736 critical
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!