Vulnerability №18 related to nsNodeUtils::NativeAnonymousChildListChange function Vulnerability №17 related to nsDisplayList::HitTest function that mishandles rendering display transformation Vulnerability №16 related to process JavaScript event-handler attributes of a MARQUEE element within a sandboxed IFRAME element that lacks the sandbox=”allow-scripts” attribute value Vulnerability №15 can be exploited via packets that trigger incorrect buffer-resize operations during buffering Vulnerability №14 caused by mishandling changes from ‘INPUT type=”password”‘ to ‘INPUT type=”text”‘ within a single Session Manager session Vulnerability №13 related to CanonicalizeXPCOMParticipant function Vulnerability №12 related to WebRTC socket thread Vulnerability №11 related to js::PreliminaryObjectArray::sweep function Vulnerability №10 related to nsXULPopupManager::KeyDown function Vulnerability №8 caused by Stack-based buffer underflow in the mozilla::gfx::BasePoint4d function Vulnerability №5 related to cairo _cairo_surface_get_extents calls that do not properly interact with libav header allocation in FFmpeg 0.10 Vulnerability №4 caused by Heap-based buffer overflow in the nsBidi::BracketData::AddOpening function Vulnerability №3 can be exploited via malformed video and Gecko Media Plugin (GMP) sandbox bypass. To exploit vulnerability №2 can be exploited via vectors related to Http2Session::Shutdown, SpdySession31::Shutdown, and other vectors. An improper flags handling can be exploited via a specially designed URL to spoof user interface.An unknown vulnerability can be exploited remotely via a special characters to spoof user interface.Lack of drag-n-drop restrictions can be exploited via a specially designed web site to access local files.An unknown vulnerability can be exploited user-assisted remote attackers via a files manipulation to bypass security restrictions, conduct universal cross-site scripting attack or read arbitrary files.Use-after-free vulnerability can be exploited remotely via a specially designed SVG element to cause denial of service or execute arbitrary code.An improper rendering display transformation handling can be exploited remotely via a specially designed web site to execute arbitrary code.Lack of restrictions can be exploited via a specially designed web-site to conduct cross-site scripting.
0 Comments
Leave a Reply. |