| Vuln ID | Summary | CVSS Severity |
|---|---|---|
| CVE-2015-4488 |
Use-after-free vulnerability in the StyleAnimationValue class in Mozilla Firefox before 40.0, Firefox ESR 38.x before 38.2, and Firefox OS before 2.2 allows remote attackers to have an unspecified impact by leveraging a StyleAnimationValue::operator self assignment. Published: August 15, 2015; 9:59:16 PM -0400 |
V3.x:(not available) V2.0: 7.5 HIGH |
| CVE-2015-4487 |
The nsTSubstring::ReplacePrep function in Mozilla Firefox before 40.0, Firefox ESR 38.x before 38.2, and Firefox OS before 2.2 might allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors, related to an "overflow." Published: August 15, 2015; 9:59:15 PM -0400 |
V3.x:(not available) V2.0: 7.5 HIGH |
| CVE-2015-4486 |
The decrease_ref_count function in libvpx in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via malformed WebM video data. Published: August 15, 2015; 9:59:14 PM -0400 |
V3.x:(not available) V2.0: 10.0 HIGH |
| CVE-2015-4485 |
Heap-based buffer overflow in the resize_context_buffers function in libvpx in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code via malformed WebM video data. Published: August 15, 2015; 9:59:13 PM -0400 |
V3.x:(not available) V2.0: 10.0 HIGH |
| CVE-2015-4484 |
The js::jit::AssemblerX86Shared::lock_addl function in the JavaScript implementation in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to cause a denial of service (application crash) by leveraging the use of shared memory and accessing (1) an Atomics object or (2) a SharedArrayBuffer object. Published: August 15, 2015; 9:59:12 PM -0400 |
V3.x:(not available) V2.0: 5.0 MEDIUM |
| CVE-2015-4480 |
Integer overflow in the stagefright::SampleTable::isValid function in libstagefright in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code via crafted MPEG-4 video data with H.264 encoding. Published: August 15, 2015; 9:59:07 PM -0400 |
V3.x:(not available) V2.0: 9.3 HIGH |
| CVE-2015-4479 |
Multiple integer overflows in libstagefright in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allow remote attackers to execute arbitrary code via a crafted saio chunk in MPEG-4 video data. Published: August 15, 2015; 9:59:06 PM -0400 |
V3.x:(not available) V2.0: 10.0 HIGH |
| CVE-2015-4478 |
Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 do not impose certain ECMAScript 6 requirements on JavaScript object properties, which allows remote attackers to bypass the Same Origin Policy via the reviver parameter to the JSON.parse method. Published: August 15, 2015; 9:59:05 PM -0400 |
V3.x:(not available) V2.0: 5.0 MEDIUM |
| CVE-2015-4477 |
Use-after-free vulnerability in the MediaStream playback feature in Mozilla Firefox before 40.0 allows remote attackers to execute arbitrary code via unspecified use of the Web Audio API. Published: August 15, 2015; 9:59:04 PM -0400 |
V3.x:(not available) V2.0: 10.0 HIGH |
| CVE-2015-4475 |
The mozilla::AudioSink function in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 mishandles inconsistent sample formats within MP3 audio data, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via a malformed file. Published: August 15, 2015; 9:59:03 PM -0400 |
V3.x:(not available) V2.0: 7.5 HIGH |
| CVE-2015-4474 |
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 40.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. Published: August 15, 2015; 9:59:02 PM -0400 |
V3.x:(not available) V2.0: 10.0 HIGH |
| CVE-2015-4473 |
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. Published: August 15, 2015; 9:59:00 PM -0400 |
V3.x:(not available) V2.0: 10.0 HIGH |
| CVE-2015-1819 |
The xmlreader in libxml allows remote attackers to cause a denial of service (memory consumption) via crafted XML data, related to an XML Entity Expansion (XEE) attack. Published: August 14, 2015; 2:59:03 PM -0400 |
V3.x:(not available) V2.0: 5.0 MEDIUM |
| CVE-2013-7443 |
Buffer overflow in the skip-scan optimization in SQLite 3.8.2 allows remote attackers to cause a denial of service (crash) via crafted SQL statements. Published: August 12, 2015; 10:59:00 AM -0400 |
V3.x:(not available) V2.0: 5.0 MEDIUM |
| CVE-2015-5523 |
The ParseValue function in lexer.c in tidy before 4.9.31 allows remote attackers to cause a denial of service (crash) via vectors involving multiple whitespace characters before an empty href, which triggers a large memory allocation. Published: August 11, 2015; 10:59:15 AM -0400 |
V3.x:(not available) V2.0: 4.3 MEDIUM |
| CVE-2015-5522 |
Heap-based buffer overflow in the ParseValue function in lexer.c in tidy before 4.9.31 allows remote attackers to cause a denial of service (crash) via vectors involving a command character in an href. Published: August 11, 2015; 10:59:14 AM -0400 |
V3.x:(not available) V2.0: 6.8 MEDIUM |
| CVE-2015-4495 |
The PDF reader in Mozilla Firefox before 39.0.3, Firefox ESR 38.x before 38.1.1, and Firefox OS before 2.2 allows remote attackers to bypass the Same Origin Policy, and read arbitrary files or gain privileges, via vectors involving crafted JavaScript code and a native setter, as exploited in the wild in August 2015. Published: August 07, 2015; 8:59:04 PM -0400 |
V3.x:(not available) V2.0: 4.3 MEDIUM |
| CVE-2015-3636 |
The ping_unhash function in net/ipv4/ping.c in the Linux kernel before 4.0.3 does not initialize a certain list data structure during an unhash operation, which allows local users to gain privileges or cause a denial of service (use-after-free and system crash) by leveraging the ability to make a SOCK_DGRAM socket system call for the IPPROTO_ICMP or IPPROTO_ICMPV6 protocol, and then making a connect system call after a disconnect. Published: August 05, 2015; 9:59:00 PM -0400 |
V3.x:(not available) V2.0: 4.9 MEDIUM |
| CVE-2015-4167 |
The udf_read_inode function in fs/udf/inode.c in the Linux kernel before 3.19.1 does not validate certain length values, which allows local users to cause a denial of service (incorrect data representation or integer overflow, and OOPS) via a crafted UDF filesystem. Published: August 05, 2015; 2:59:00 PM -0400 |
V3.x:(not available) V2.0: 4.7 MEDIUM |
| CVE-2015-1872 |
The ff_mjpeg_decode_sof function in libavcodec/mjpegdec.c in FFmpeg before 2.5.4 does not validate the number of components in a JPEG-LS Start Of Frame segment, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted Motion JPEG data. Published: July 26, 2015; 6:59:01 PM -0400 |
V3.x:(not available) V2.0: 6.8 MEDIUM |