CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
EPSS
Percentile
96.5%
The Mozilla Project reports:
MFSA 2015-96 Miscellaneous memory safety hazards (rv:41.0
/ rv:38.3)
MFSA 2015-97 Memory leak in mozTCPSocket to servers
MFSA 2015-98 Out of bounds read in QCMS library with ICC
V4 profile attributes
MFSA 2015-99 Site attribute spoofing on Android by
pasting URL with unknown scheme
MFSA 2015-100 Arbitrary file manipulation by local user
through Mozilla updater
MFSA 2015-101 Buffer overflow in libvpx while parsing vp9
format video
MFSA 2015-102 Crash when using debugger with SavedStacks
in JavaScript
MFSA 2015-103 URL spoofing in reader mode
MFSA 2015-104 Use-after-free with shared workers and
IndexedDB
MFSA 2015-105 Buffer overflow while decoding WebM
video
MFSA 2015-106 Use-after-free while manipulating HTML
media content
MFSA 2015-107 Out-of-bounds read during 2D canvas display
on Linux 16-bit color depth systems
MFSA 2015-108 Scripted proxies can access inner
window
MFSA 2015-109 JavaScript immutable property enforcement
can be bypassed
MFSA 2015-110 Dragging and dropping images exposes final
URL after redirects
MFSA 2015-111 Errors in the handling of CORS preflight
request headers
MFSA 2015-112 Vulnerabilities found through code
inspection
MFSA 2015-113 Memory safety errors in libGLES in the
ANGLE graphics library
MFSA 2015-114 Information disclosure via the High
Resolution Time API
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
FreeBSD | any | noarch | firefox | < 41.0,1 | UNKNOWN |
FreeBSD | any | noarch | linux-firefox | < 41.0,1 | UNKNOWN |
FreeBSD | any | noarch | seamonkey | < 2.38 | UNKNOWN |
FreeBSD | any | noarch | linux-seamonkey | < 2.38 | UNKNOWN |
FreeBSD | any | noarch | firefox-esr | < 38.3.0,1 | UNKNOWN |
FreeBSD | any | noarch | libxul | < 38.3.0 | UNKNOWN |
FreeBSD | any | noarch | thunderbird | < 38.3.0 | UNKNOWN |
FreeBSD | any | noarch | linux-thunderbird | < 38.3.0 | UNKNOWN |
www.mozilla.org/security/advisories/mfsa2015-100/
www.mozilla.org/security/advisories/mfsa2015-101/
www.mozilla.org/security/advisories/mfsa2015-102/
www.mozilla.org/security/advisories/mfsa2015-103/
www.mozilla.org/security/advisories/mfsa2015-104/
www.mozilla.org/security/advisories/mfsa2015-105/
www.mozilla.org/security/advisories/mfsa2015-106/
www.mozilla.org/security/advisories/mfsa2015-107/
www.mozilla.org/security/advisories/mfsa2015-108/
www.mozilla.org/security/advisories/mfsa2015-109/
www.mozilla.org/security/advisories/mfsa2015-110/
www.mozilla.org/security/advisories/mfsa2015-111/
www.mozilla.org/security/advisories/mfsa2015-112/
www.mozilla.org/security/advisories/mfsa2015-113/
www.mozilla.org/security/advisories/mfsa2015-114/
www.mozilla.org/security/advisories/mfsa2015-96/
www.mozilla.org/security/advisories/mfsa2015-97/
www.mozilla.org/security/advisories/mfsa2015-98/
www.mozilla.org/security/advisories/mfsa2015-99/