Show filters
234 Total Results
Displaying 121-130 of 234
Sort by:
Attacker Value
Unknown
CVE-2014-1512
Disclosure Date: March 19, 2014 (last updated October 05, 2023)
Use-after-free vulnerability in the TypeObject class in the JavaScript engine in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to execute arbitrary code by triggering extensive memory consumption while garbage collection is occurring, as demonstrated by improper handling of BumpChunk objects.
0
Attacker Value
Unknown
CVE-2014-1511
Disclosure Date: March 19, 2014 (last updated October 05, 2023)
Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allow remote attackers to bypass the popup blocker via unspecified vectors.
0
Attacker Value
Unknown
CVE-2014-1513
Disclosure Date: March 19, 2014 (last updated October 05, 2023)
TypedArrayObject.cpp in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 does not prevent a zero-length transition during use of an ArrayBuffer object, which allows remote attackers to execute arbitrary code or cause a denial of service (heap-based out-of-bounds write or read) via a crafted web site.
0
Attacker Value
Unknown
CVE-2014-1509
Disclosure Date: March 19, 2014 (last updated October 05, 2023)
Buffer overflow in the _cairo_truetype_index_to_ucs4 function in cairo, as used in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25, allows remote attackers to execute arbitrary code via a crafted extension that renders fonts in a PDF document.
0
Attacker Value
Unknown
CVE-2014-1505
Disclosure Date: March 19, 2014 (last updated October 05, 2023)
The SVG filter implementation in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to obtain sensitive displacement-correlation information, and possibly bypass the Same Origin Policy and read text from a different domain, via a timing attack involving feDisplacementMap elements, a related issue to CVE-2013-1693.
0
Attacker Value
Unknown
CVE-2014-1508
Disclosure Date: March 19, 2014 (last updated October 05, 2023)
The libxul.so!gfxContext::Polygon function in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to obtain sensitive information from process memory, cause a denial of service (out-of-bounds read and application crash), or possibly bypass the Same Origin Policy via vectors involving MathML polygon rendering.
0
Attacker Value
Unknown
CVE-2014-1484
Disclosure Date: February 06, 2014 (last updated October 05, 2023)
Mozilla Firefox before 27.0 on Android 4.2 and earlier creates system-log entries containing profile paths, which allows attackers to obtain sensitive information via a crafted application.
0
Attacker Value
Unknown
CVE-2014-1488
Disclosure Date: February 06, 2014 (last updated October 05, 2023)
The Web workers implementation in Mozilla Firefox before 27.0 and SeaMonkey before 2.24 allows remote attackers to execute arbitrary code via vectors involving termination of a worker process that has performed a cross-thread object-passing operation in conjunction with use of asm.js.
0
Attacker Value
Unknown
CVE-2014-1479
Disclosure Date: February 06, 2014 (last updated October 05, 2023)
The System Only Wrapper (SOW) implementation in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 does not prevent certain cloning operations, which allows remote attackers to bypass intended restrictions on XUL content via vectors involving XBL content scopes.
0
Attacker Value
Unknown
CVE-2014-1480
Disclosure Date: February 06, 2014 (last updated October 05, 2023)
The file-download implementation in Mozilla Firefox before 27.0 and SeaMonkey before 2.24 does not properly restrict the timing of button selections, which allows remote attackers to conduct clickjacking attacks, and trigger unintended launching of a downloaded file, via a crafted web site.
0