Page 136 of 2526 results (0.018 seconds)

CVSS: 8.1EPSS: 1%CPEs: 2EXPL: 0

03 Jul 2015 — Mozilla Firefox 38.0 and Firefox ESR 38.0 allow user-assisted remote attackers to read arbitrary files or execute arbitrary JavaScript code with chrome privileges via a crafted web site that is accessed with unspecified mouse and keyboard actions. NOTE: this vulnerability exists because of a CVE-2015-0821 regression. Mozilla Firefox 38.0 y Firefox ESR 38.0 permiten a atacantes remotos asistidos por usuario leer ficheros arbitrarios o ejecutar código JavaScript arbitrario con privilegios chrome a través de u... • http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html • CWE-20: Improper Input Validation •

CVSS: 10.0EPSS: 2%CPEs: 21EXPL: 0

03 Jul 2015 — Use-after-free vulnerability in the CanonicalizeXPCOMParticipant function in Mozilla Firefox before 39.0 and Firefox ESR 31.x before 31.8 and 38.x before 38.1 allows remote attackers to execute arbitrary code via vectors involving attachment of an XMLHttpRequest object to a shared worker. Vulnerabilidad de uso después de liberación en la función CanonicalizeXPCOMParticipant en Mozilla Firefox anterior a 39.0 y Firefox ESR 31.x anterior a 31.8 y 38.x anterior a 38.1 permite a atacantes remotos ejecutar códig... • http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html • CWE-416: Use After Free •

CVSS: 4.3EPSS: 94%CPEs: 42EXPL: 1

21 May 2015 — The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the "Logjam" issue. El protocolo TLS 1.2 y anteriores, cuando una suite de cifrado DHE_EXPORT está habilitada en un servidor pero no en un cliente, no t... • https://github.com/fatlan/HAProxy-Keepalived-Sec-HighLoads • CWE-310: Cryptographic Issues CWE-327: Use of a Broken or Risky Cryptographic Algorithm •

CVSS: 7.3EPSS: 0%CPEs: 1EXPL: 0

14 May 2015 — The update implementation in Mozilla Firefox before 38.0 on Windows does not ensure that the pathname for updater.exe corresponds to the application directory, which might allow local users to gain privileges via a Trojan horse file. La implementación de actualización en Mozilla Firefox anterior a 38.0 en Windows no asegura que el nombre de ruta para updater.exe corresponda con el directorio de la aplicación, lo que podría permitir a usuarios locales ganar privilegios a través de un fichero troyano. • http://www.mozilla.org/security/announce/2015/mfsa2015-58.html • CWE-17: DEPRECATED: Code •

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 0

14 May 2015 — Mozilla Firefox before 38.0 on Android does not properly restrict writing URL data to the Android logging system, which allows attackers to obtain sensitive information via a crafted application that has a required permission for reading a log, as demonstrated by the READ_LOGS permission for the mixed-content violation log on Android 4.0 and earlier. Mozilla Firefox anterior a 38.0 en Android no restringe correctamente la escritura de datos de URLs en el sistema de registros de, lo que permite a atacantes o... • http://www.mozilla.org/security/announce/2015/mfsa2015-52.html • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 9.8EPSS: 1%CPEs: 3EXPL: 0

14 May 2015 — Race condition in the nsThreadManager::RegisterCurrentThread function in Mozilla Firefox before 38.0 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and heap memory corruption) by leveraging improper Media Decoder Thread creation at the time of a shutdown. Condición de carrera en la función nsThreadManager::RegisterCurrentThread en Mozilla Firefox anterior a 38.0 permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (uso des... • http://lists.opensuse.org/opensuse-updates/2015-05/msg00036.html • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 8.8EPSS: 5%CPEs: 3EXPL: 0

14 May 2015 — The asm.js implementation in Mozilla Firefox before 38.0 does not properly determine heap lengths during identification of cases in which bounds checking may be safely skipped, which allows remote attackers to trigger out-of-bounds write operations and possibly execute arbitrary code, or trigger out-of-bounds read operations and possibly obtain sensitive information from process memory, via crafted JavaScript. La implementación asm.js en Mozilla Firefox anterior a 38.0 no determina correctamente las longitu... • http://lists.opensuse.org/opensuse-updates/2015-05/msg00036.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.3EPSS: 0%CPEs: 3EXPL: 0

14 May 2015 — Mozilla Firefox before 38.0 does not recognize a referrer policy delivered by a referrer META element in cases of context-menu navigation and middle-click navigation, which allows remote attackers to obtain sensitive information by reading web-server Referer logs that contain private data in a URL, as demonstrated by a private path component. Mozilla Firefox anterior a 38.0 no reconoce una política de referer entregada por un elemento META del referer en casos de la navegación del menú contextual y la naveg... • http://lists.opensuse.org/opensuse-updates/2015-05/msg00036.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 6.5EPSS: 0%CPEs: 3EXPL: 0

14 May 2015 — The WebChannel.jsm module in Mozilla Firefox before 38.0 allows remote attackers to bypass the Same Origin Policy and obtain sensitive webchannel-response data via a crafted web site containing an IFRAME element referencing a different web site that is intended to read this data. El módulo WebChannel.jsm en Mozilla Firefox anterior a 38.0 permite a atacantes remotos evadir Same Origin Policy y obtener datos sensibles de respuestas de canales de web a través de un sitio web manipulado que contiene un element... • http://lists.opensuse.org/opensuse-updates/2015-05/msg00036.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 8.8EPSS: 0%CPEs: 6EXPL: 0

14 May 2015 — Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 38.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. Múltiples vulnerabilidades no especificadas en el motor de navegación de Mozilla Firefox anterior a 38.0 permiten a atacantes remotos causar una denegación de servicio (corrupción de memoria y caída de aplicación) o posiblemente ejecutar código arbitrario a través de vect... • http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00054.html •