Description
Multiple serious vulnerabilities have been found in Mozilla products. Malicious users can exploit these vulnerabilities to bypass security restrictions, cause denial of service, execute arbitrary code or obtain sensitive information.
Below is a complete list of vulnerabilities
- Multiple memory bugs can be exploited remotely via vectors related to browser engine;
- Error while fixing previous vulnerabilities can be exploited remotely via specially designed URL;
- Improper IDBDatabase handling can be exploited remotely via an unknown vectors;
- Out-of-bound read can be exploited via vectors related to web audio, specially designed XMLHttpRequest object and DOM objects manipulations;
- Uninitialized memory usage can be exploited remotely via an unknown vectors;
- Lack of certificates override restrictions can be exploited remotely via making user to override certificate;
- Recording keystrokes that triggered errors can be exploited remotely via crash reports from OS X;
- An unknown vulnerability in PDF.js can be exploited remotely via a specially designed PDF;
- Multiple TLS vulnerabilities can be exploited remotely via an unknown vectors.
Original advisories
Related products
CVE list
- CVE-2015-2731 critical
- CVE-2015-2734 critical
- CVE-2015-2742 warning
- CVE-2015-2739 critical
- CVE-2015-2738 critical
- CVE-2015-2735 critical
- CVE-2015-2743 critical
- CVE-2015-2721 warning
- CVE-2015-2730 warning
- CVE-2015-2740 critical
- CVE-2015-2741 warning
- CVE-2015-2728 critical
- CVE-2015-2727 high
- CVE-2015-2725 critical
- CVE-2015-2726 critical
- CVE-2015-2733 critical
- CVE-2015-2724 critical
- CVE-2015-2729 critical
- CVE-2015-2722 critical
- CVE-2015-2737 critical
- CVE-2015-2736 critical
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!