![](/assets/img/cve_300x82_sin_bg.png)
CVE-2013-0796 – Mozilla: WebGL crash with Mesa graphics driver on Linux (MFSA 2013-35)
https://notcve.org/view.php?id=CVE-2013-0796
03 Apr 2013 — The WebGL subsystem in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, and SeaMonkey before 2.17 on Linux does not properly interact with Mesa drivers, which allows remote attackers to execute arbitrary code or cause a denial of service (free of unallocated memory) via unspecified vectors. El subsistema de WebGL en Mozilla Firefox antes de v20.0, Firefox ESR v17.x antes de v17.0.5, Thunderbird antes de v17.0.5, Thunderbird ESR v17.x... • http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2013-0794 – Gentoo Linux Security Advisory 201309-23
https://notcve.org/view.php?id=CVE-2013-0794
03 Apr 2013 — Mozilla Firefox before 20.0 and SeaMonkey before 2.17 do not prevent origin spoofing of tab-modal dialogs, which allows remote attackers to conduct phishing attacks via a crafted web site. Mozilla Firefox anterior a v20.0 y SeaMonkey anterior a v2.17 no previene origen de suplantación en diálogos tabulados, lo que permite a atacantes remotos llevar ataques de phising a través de sitios web manipulados. Multiple vulnerabilities have been found in Mozilla Firefox, Thunderbird, and SeaMonkey, some of which may... • http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2013-0791 – Mozilla: Out-of-bounds array read in CERT_DecodeCertPackage (MFSA 2013-40)
https://notcve.org/view.php?id=CVE-2013-0791
03 Apr 2013 — The CERT_DecodeCertPackage function in Mozilla Network Security Services (NSS), as used in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, SeaMonkey before 2.17, and other products, allows remote attackers to cause a denial of service (out-of-bounds read and memory corruption) via a crafted certificate. La función CERT_DecodeCertPackage en Mozilla Network Security Services (NSS), tal como se utiliza en Mozilla Firefox antes de v20.0... • http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2013-0789 – Gentoo Linux Security Advisory 201309-23
https://notcve.org/view.php?id=CVE-2013-0789
03 Apr 2013 — Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 20.0 and SeaMonkey before 2.17 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the nsContentUtils::HoldJSObjects function and the nsAutoPtr class, and other vectors. Múltiples vulnerabilidades sin especificar en el motor de búsqueda de Mozilla Firefox anterior a v20.0 y SeaMonkey anterior a v2.17 permite a atacantes remot... • http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2013-0793 – Mozilla: Cross-site scripting (XSS) using timed history navigations (MFSA 2013-38)
https://notcve.org/view.php?id=CVE-2013-0793
03 Apr 2013 — Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, and SeaMonkey before 2.17 do not ensure the correctness of the address bar during history navigation, which allows remote attackers to conduct cross-site scripting (XSS) attacks or phishing attacks by leveraging control over navigation timing. Mozilla Firefox antes de 20.0, Firefox ESR v17.x antes v17.0.5, Thunderbird antes de 17.0.5, Thunderbird ESR v17.x antes de v17.0.5 y SeaMonkey ... • http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2013-0792 – Gentoo Linux Security Advisory 201309-23
https://notcve.org/view.php?id=CVE-2013-0792
03 Apr 2013 — Mozilla Firefox before 20.0 and SeaMonkey before 2.17, when gfx.color_management.enablev4 is used, do not properly handle color profiles during PNG rendering, which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (memory corruption) via a grayscale PNG image. Mozilla Firefox anterior a v20.0 y SeaMonkey antes de v2.17, cuando se utiliza gfx.color_management.enablev4, no tratan correctamente los perfiles de color durante el procesamiento PNG, que permi... • http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2013-0795 – Mozilla: Bypass of SOW protections allows cloning of protected nodes (MFSA 2013-36)
https://notcve.org/view.php?id=CVE-2013-0795
03 Apr 2013 — The System Only Wrapper (SOW) implementation in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, and SeaMonkey before 2.17 does not prevent use of the cloneNode method for cloning a protected node, which allows remote attackers to bypass the Same Origin Policy or possibly execute arbitrary JavaScript code with chrome privileges via a crafted web site. El System Only Wrapper (SOW) implementado en la aplicación Mozilla Firefox antes de... • http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html • CWE-264: Permissions, Privileges, and Access Controls •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2013-0788 – Mozilla: Miscellaneous memory safety hazards (rv:17.0.5) (MFSA 2013-30)
https://notcve.org/view.php?id=CVE-2013-0788
03 Apr 2013 — Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, and SeaMonkey before 2.17 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. Múltiples vulnerabilidades sin especificar en el motor de navegación de Mozilla Firefox anterior a 20.0, Firefox ESR 17.x anterior a 17.0.5, Thunderbi... • http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2013-0797 – Gentoo Linux Security Advisory 201309-23
https://notcve.org/view.php?id=CVE-2013-0797
03 Apr 2013 — Untrusted search path vulnerability in the Mozilla Updater in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, and SeaMonkey before 2.17 allows local users to gain privileges via a Trojan horse DLL file in an unspecified directory. Vulnerabilidad de path de búsqueda no confiable en Mozilla Updater en Mozilla Firefox antes de v20.0, Firefox ESR v17.x antes de v17.0.5, Thunderbird anterior v17.0.5, Thunderbird ESR v17.x anterior v17.0.... • http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00013.html •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2013-2566 – Gentoo Linux Security Advisory 201406-19
https://notcve.org/view.php?id=CVE-2013-2566
14 Mar 2013 — The RC4 algorithm, as used in the TLS protocol and SSL protocol, has many single-byte biases, which makes it easier for remote attackers to conduct plaintext-recovery attacks via statistical analysis of ciphertext in a large number of sessions that use the same plaintext. El algoritmo RC4, tal como se usa en el protocolo TLS y protocolo SSL, tiene muchos "single-byte biases", lo que hace que sea más fácil para atacantes remotos realizar ataques de recuperación de texto claro a través de análisis estadístico... • http://blog.cryptographyengineering.com/2013/03/attack-of-week-rc4-is-kind-of-broken-in.html • CWE-326: Inadequate Encryption Strength •