Description
Multiple serious vulnerabilities have been found in Mozilla products. Malicious users can exploit these vulnerabilities to cause denial of service, gain privilleges, obtain sensitiv information, execute arbitrary code, spoof user interface or read local files.
Below is a complete list of vulnerabilities
- An unspecified vulnerabilities can be exploited remotely via unknown vectors;
- Buffer overflow can be exploited remotely via a specially designed MP3 file, MP4 file or SVG graphics;
- An use-after-free vulnerability can be exploited remotely via specially designed content and other unknown vectors;
- Improper domain name recognition can be exploited remotely via a specially designed URL;
- An untrusted path vulnerability can be exploited locally via DLL hijack;
- Improper memory allocation can be exploited remotely via a specially designed WebGL content;
- An unspecified vulnerability can be exploited remotely via unknown vectors;
- Unknown vulnerability related to form autocompletion can be exploited remotely via a specially designed JavaScript;
- A double free vulnerability can be exploited remotely via specially designed JavaScript;
- An unknwon vulnerability can be exploited remotely via a specially designed CSS;
- Lack of API restrictions can be exploited remotely via vectirs related to UITour;
- Lack of transaction restrictions and other unknown vulnerabilities can be exploited remotely via specially designed web site;
Original advisories
Related products
CVE list
- CVE-2015-0823 critical
- CVE-2015-0828 high
- CVE-2015-0834 warning
- CVE-2015-0835 critical
- CVE-2015-0836 critical
- CVE-2015-0825 warning
- CVE-2015-0831 high
- CVE-2015-0830 critical
- CVE-2015-0824 critical
- CVE-2015-0827 warning
- CVE-2015-0829 high
- CVE-2015-0822 warning
- CVE-2015-0833 high
- CVE-2015-0826 high
- CVE-2015-0820 warning
- CVE-2015-0832 critical
- CVE-2015-0821 high
- CVE-2015-0819 warning
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!