Описание
Multiple serious vulnerabilities have been found in Mozilla Firefox before 37.0, Mozilla Firefox ESR 31.x before 31.6, Mozilla Thunderbird before 31.6. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause a denial of service (heap memory corruption) and bypass an intended user-confirmation requirement.
Below is a complete list of vulnerabilities
- Improper resource:URLs restrictions, which can lead to execution arbitrary JavaScript code to bypass the Same Origin Policy;
- Multiple unspecified vulnerabilities in the browser engine can be exploited via unknown vectors;
- Lack of HTTPS session enforcement for lightweight theme add-on installations in Mozilla Firefox before 37.0 can lead to man-in-the-middle attacks;
- The QCMS implementation in Mozilla Firefox can be exploited via an image that is improperly handled during transformation;
- The webrtc::VPMContentAnalysis::Release function in the WebRTC implementation in Mozilla Firefox before 37.0 can be exploited via unspecified vectors;
- The navigator.sendBeacon implementation can be exploited via a crafted web site;
- The Off Main Thread Compositing (OMTC) implementation in Mozilla Firefox before 37.0 can be exploited via vectors that trigger rendering of 2D graphics content;
- The HTMLSourceElement::BindToTree function in Mozilla Firefox before 37.0 can be exploited via a crafted HTML document containing a SOURCE element.
Первичный источник обнаружения
Эксплуатация
Public exploits exist for this vulnerability.
Связанные продукты
Список CVE
- CVE-2015-0812 warning
- CVE-2015-0813 high
- CVE-2015-0810 warning
- CVE-2015-0811 high
- CVE-2015-0815 critical
- CVE-2015-0814 critical
- CVE-2015-0805 critical
- CVE-2015-0806 critical
- CVE-2015-0804 critical
- CVE-2015-0816 critical
- CVE-2015-0807 high
- CVE-2015-0808 critical
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!