Описание
Multiple serious vulnerabilities have been found in Mozilla Firefox before 37.0, Mozilla Firefox ESR 31.x before 31.6, Mozilla Thunderbird before 31.6. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause a denial of service (heap memory corruption) and bypass an intended user-confirmation requirement.
Below is a complete list of vulnerabilities
- Improper resource:URLs restrictions, which can lead to execution arbitrary JavaScript code to bypass the Same Origin Policy;
- Multiple unspecified vulnerabilities in the browser engine can be exploited via unknown vectors;
- Lack of HTTPS session enforcement for lightweight theme add-on installations in Mozilla Firefox before 37.0 can lead to man-in-the-middle attacks;
- The QCMS implementation in Mozilla Firefox can be exploited via an image that is improperly handled during transformation;
- The webrtc::VPMContentAnalysis::Release function in the WebRTC implementation in Mozilla Firefox before 37.0 can be exploited via unspecified vectors;
- The navigator.sendBeacon implementation can be exploited via a crafted web site;
- The Off Main Thread Compositing (OMTC) implementation in Mozilla Firefox before 37.0 can be exploited via vectors that trigger rendering of 2D graphics content;
- The HTMLSourceElement::BindToTree function in Mozilla Firefox before 37.0 can be exploited via a crafted HTML document containing a SOURCE element.
Первичный источник обнаружения
Эксплуатация
Public exploits exist for this vulnerability.
Связанные продукты
Список CVE
- CVE-2015-0812 warning
- CVE-2015-0813 high
- CVE-2015-0810 warning
- CVE-2015-0811 high
- CVE-2015-0815 high
- CVE-2015-0814 high
- CVE-2015-0805 high
- CVE-2015-0806 high
- CVE-2015-0804 high
- CVE-2015-0816 warning
- CVE-2015-0807 high
- CVE-2015-0808 warning
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!