Page 270 of 2025 results (0.021 seconds)

CVSS: 6.8EPSS: 7%CPEs: 1EXPL: 0

Race condition in the AsyncPaintWaitEvent::AsyncPaintWaitEvent function in Mozilla Firefox before 37.0.2 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via a crafted plugin that does not properly complete initialization. Condición de carrera en la función AsyncPaintWaitEvent::AsyncPaintWaitEvent en Mozilla Firefox anterior a 37.0.2 permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (uso después de liberación) a través de un plugin manipulado que no completa la inicialización correctamente. • http://lists.opensuse.org/opensuse-updates/2015-04/msg00044.html http://lists.opensuse.org/opensuse-updates/2015-04/msg00046.html http://www.mozilla.org/security/announce/2015/mfsa2015-45.html http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.securityfocus.com/bid/74247 http://www.securitytracker.com/id/1032171 http://www.ubuntu.com/usn/USN-2571-1 https://bugzilla.mozilla.org/show_bug.cgi?id=1141081 https://security.gentoo.org/glsa/201512-10 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 6.8EPSS: 2%CPEs: 40EXPL: 0

GStreamer before 1.4.5, as used in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 on Linux, allows remote attackers to cause a denial of service (buffer over-read and application crash) or possibly execute arbitrary code via crafted H.264 video data in an m4v file. GStreamer anterior a 1.4.5, utilizado en Mozilla Firefox anterior a 38.0, Firefox ESR 31.x anterior a 31.7, y Thunderbird anterior a 31.7 en Linux, permite a atacantes remotos causar una denegación de servicio (sobrelectura de buffer y caída de aplicación) o posiblemente ejecutar código arbitrario a través de datos de vídeo H.264 manipulados en un fichero m4v. • http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00017.html http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00054.html http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00000.html http://rhn.redhat.com/errata/RHSA-2015-0988.html http://rhn.redhat.com/errata/RHSA-2015-1012.html http://www.debian.org/security/2015/dsa-3225 http://www.debian.org/security/2015/dsa-3260 http://www.debian.org/security/2015/dsa-3264 http://www.mozilla. • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

The Reader mode feature in Mozilla Firefox before 37.0.1 on Android, and Desktop Firefox pre-release, does not properly handle privileged URLs, which makes it easier for remote attackers to execute arbitrary JavaScript code with chrome privileges by leveraging the ability to bypass the Same Origin Policy. La característica Reader mode en Mozilla Firefox anterior a 37.0.1 en Android, y el prelanzamiento de Desktop Firefox, no maneja correctamente las URLs privilegiadas, lo que facilita a atacantes remotos ejecutar código JavaScript arbitrario con privilegios chrome mediante el aprovechamiento de la habilidad de evadir Same Origin Policy. • http://www.mozilla.org/security/announce/2015/mfsa2015-43.html http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.securitytracker.com/id/1032029 https://bugzilla.mozilla.org/show_bug.cgi?id=1147597 https://security.gentoo.org/glsa/201512-10 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 4.3EPSS: 0%CPEs: 6EXPL: 0

The HTTP Alternative Services feature in Mozilla Firefox before 37.0.1 allows man-in-the-middle attackers to bypass an intended X.509 certificate-verification step for an SSL server by specifying that server in the uri-host field of an Alt-Svc HTTP/2 response header. La característica HTTP Alternative Services en Mozilla Firefox anterior a 37.0.1 permite a atacantes man-in-the-middle evadir la verificación de los certificados X.509 para un servidor SSL mediante la especificación de este servidor en el campo uri-host de una cabecera de respuesta Alt-Svc HTTP/2. • http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html http://www.mozilla.org/security/announce/2015/mfsa2015-44.html http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.securitytracker.com/id/1032030 http://www.ubuntu.com/usn/USN-2557-1 https://bugzilla.mozilla.org/show_bug.cgi?id=1148328 https://security.gentoo.org/glsa/201512-10 • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 4%CPEs: 6EXPL: 0

The Off Main Thread Compositing (OMTC) implementation in Mozilla Firefox before 37.0 attempts to use memset for a memory region of negative length during interaction with the mozilla::layers::BufferTextureClient::AllocateForSurface function, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors that trigger rendering of 2D graphics content. La implementación Off Main Thread Compositing (OMTC) en Mozilla Firefox anterior a 37.0 intenta utilizar memset para una región de memoria de longitud negativa durante la interacción con la función mozilla::layers::BufferTextureClient::AllocateForSurface, lo que permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (corrupción de memoria) a través de vectores que provocan la renderización del contenido de gráficos en 2D. • http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html http://www.mozilla.org/security/announce/2015/mfsa2015-38.html http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.securitytracker.com/id/1031996 http://www.ubuntu.com/usn/USN-2550-1 https://bugzilla.mozilla.org/show_bug.cgi?id=1099437 https://security.gentoo.org/glsa/201512-10 • CWE-17: DEPRECATED: Code •