
CVE-2016-5292 – Ubuntu Security Notice USN-3124-1
https://notcve.org/view.php?id=CVE-2016-5292
19 Nov 2016 — During URL parsing, a maliciously crafted URL can cause a potentially exploitable crash. This vulnerability affects Firefox < 50. Durante el análisis de URL, una URL maliciosamente manipulada podría provocar un cierre inesperado potencialmente explotable. La vulnerabilidad afecta a Firefox en versiones anteriores a la 50. Christian Holler, Andrew McCreight, Dan Minor, Tyson Smith, Jon Coppeard, Jan-Ivar Bruaroey, Jesse Ruderman, Markus Stange, Olli Pettay, Ehsan Akhgari, Gary Kwong, Tooru Fujisawa, and Rand... • http://www.securityfocus.com/bid/94337 • CWE-20: Improper Input Validation •

CVE-2016-9076 – Ubuntu Security Notice USN-3124-1
https://notcve.org/view.php?id=CVE-2016-9076
19 Nov 2016 — An issue where a "<select>" dropdown menu can be used to cover location bar content, resulting in potential spoofing attacks. This attack requires e10s to be enabled in order to function. This vulnerability affects Firefox < 50. Un problema por el cual un menú desplegable "" puede emplearse para cubrir el contenido de la barra de direcciones, lo que resulta en potenciales ataques de suplantación. Este ataque requiere que los e10s estén habilitados para tener éxito. • http://www.securityfocus.com/bid/94337 • CWE-20: Improper Input Validation •

CVE-2016-9070 – Ubuntu Security Notice USN-3124-1
https://notcve.org/view.php?id=CVE-2016-9070
19 Nov 2016 — A maliciously crafted page loaded to the sidebar through a bookmark can reference a privileged chrome window and engage in limited JavaScript operations violating cross-origin protections. This vulnerability affects Firefox < 50. Una página maliciosamente manipulada cargada en la barra lateral a través de un marcador puede referenciar una ventana de chrome privilegiada y comenzar operaciones limitadas de JavaScript que violan las protecciones Cross-Origin. La vulnerabilidad afecta a Firefox en versiones ant... • http://www.securityfocus.com/bid/94337 • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2016-9077 – Ubuntu Security Notice USN-3124-1
https://notcve.org/view.php?id=CVE-2016-9077
19 Nov 2016 — Canvas allows the use of the "feDisplacementMap" filter on images loaded cross-origin. The rendering by the filter is variable depending on the input pixel, allowing for timing attacks when the images are loaded from third party locations. This vulnerability affects Firefox < 50. Canvas permite el uso del filtro "feDisplacementMap" en Cross-Origin cargado en imágenes. El renderizado realizado por el filtro es variable dependiendo del píxel de entrada, lo que permite ataques de sincronización cuando las imág... • http://www.securityfocus.com/bid/94337 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVE-2016-9067 – Ubuntu Security Notice USN-3124-1
https://notcve.org/view.php?id=CVE-2016-9067
19 Nov 2016 — Two use-after-free errors during DOM operations resulting in potentially exploitable crashes. This vulnerability affects Firefox < 50. Dos errores de uso de memoria previamente liberada durante operaciones DOM resultan en cierres inesperados potencialmente explotables. La vulnerabilidad afecta a Firefox en versiones anteriores a la 50. Christian Holler, Andrew McCreight, Dan Minor, Tyson Smith, Jon Coppeard, Jan-Ivar Bruaroey, Jesse Ruderman, Markus Stange, Olli Pettay, Ehsan Akhgari, Gary Kwong, Tooru Fuji... • http://www.securityfocus.com/bid/94337 • CWE-416: Use After Free •

CVE-2016-9074 – Ubuntu Security Notice USN-3163-1
https://notcve.org/view.php?id=CVE-2016-9074
17 Nov 2016 — An existing mitigation of timing side-channel attacks is insufficient in some circumstances. This issue is addressed in Network Security Services (NSS) 3.26.1. This vulnerability affects Thunderbird < 45.5, Firefox ESR < 45.5, and Firefox < 50. Una mitigación existente de los ataques de sincronización por canal lateral es insuficiente en determinadas circunstancias. Este problema se aborda en Network Security Services (NSS) 3.26.1. • http://www.securityfocus.com/bid/94341 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2016-5296 – Mozilla: Heap-buffer-overflow WRITE in rasterize_edges_1 (MFSA 2016-89, MFSA 2016-90)
https://notcve.org/view.php?id=CVE-2016-5296
16 Nov 2016 — A heap-buffer-overflow in Cairo when processing SVG content caused by compiler optimization, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 45.5, Firefox ESR < 45.5, and Firefox < 50. Un desbordamiento de búfer basado en memoria dinámica (heap) en Cairo al procesar contenido SVG generado por la optimización del compilador resulta en un cierre inesperado potencialmente explotable. La vulnerabilidad afecta a Thunderbird en versiones anteriores a la 45.5, Firefox ESR en ... • http://rhn.redhat.com/errata/RHSA-2016-2780.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2016-9066 – Mozilla: Integer overflow leading to a buffer overflow in nsScriptLoadHandler (MFSA 2016-89, MFSA 2016-90)
https://notcve.org/view.php?id=CVE-2016-9066
16 Nov 2016 — A buffer overflow resulting in a potentially exploitable crash due to memory allocation issues when handling large amounts of incoming data. This vulnerability affects Thunderbird < 45.5, Firefox ESR < 45.5, and Firefox < 50. Un desbordamiento de búfer que resulta en un cierre inesperado potencialmente explotable debido a problemas de asignación de memoria al gestionar grandes cantidades de datos entrantes. La vulnerabilidad afecta a Thunderbird en versiones anteriores a la 45.5, Firefox ESR en versiones an... • https://github.com/saelo/foxpwn • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2016-9064 – Mozilla: Addons update must verify IDs match between current and new versions (MFSA 2016-89, MFSA 2016-90)
https://notcve.org/view.php?id=CVE-2016-9064
16 Nov 2016 — Add-on updates failed to verify that the add-on ID inside the signed package matched the ID of the add-on being updated. An attacker who could perform a man-in-the-middle attack on the user's connection to the update server and defeat the certificate pinning protection could provide a malicious signed add-on instead of a valid update. This vulnerability affects Firefox ESR < 45.5 and Firefox < 50. Las actualizaciones de add-ons no verifican si el ID de add-on en el paquete firmado coincide con el ID del add... • http://rhn.redhat.com/errata/RHSA-2016-2780.html • CWE-295: Improper Certificate Validation •

CVE-2016-5297 – Mozilla: Incorrect argument length checking in Javascript (MFSA 2016-89, MFSA 2016-90)
https://notcve.org/view.php?id=CVE-2016-5297
16 Nov 2016 — An error in argument length checking in JavaScript, leading to potential integer overflows or other bounds checking issues. This vulnerability affects Thunderbird < 45.5, Firefox ESR < 45.5, and Firefox < 50. Un error en la comprobación de lógica de argumentos en JavaScript conduce a potenciales desbordamientos de enteros u otros problemas de comprobación de límites. La vulnerabilidad afecta a Thunderbird en versiones anteriores a la 45.5, Firefox ESR en versiones anteriores a la 45.5 y Firefox en versiones... • http://rhn.redhat.com/errata/RHSA-2016-2780.html • CWE-190: Integer Overflow or Wraparound •