CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
EPSS
Percentile
99.2%
The Mozilla Project reports:
MFSA-2015-01 Miscellaneous memory safety hazards (rv:35.0
/ rv:31.4)
MFSA-2015-02 Uninitialized memory use during bitmap
rendering
MFSA-2015-03 sendBeacon requests lack an Origin header
MFSA-2015-04 Cookie injection through Proxy Authenticate
responses
MFSA-2015-05 Read of uninitialized memory in Web Audio
MFSA-2015-06 Read-after-free in WebRTC
MFSA-2015-07 Gecko Media Plugin sandbox escape
MFSA-2015-08 Delegated OCSP responder certificates failure
with id-pkix-ocsp-nocheck extension
MFSA-2015-09 XrayWrapper bypass through DOM objects
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
FreeBSD | any | noarch | firefox | < 35.0,1 | UNKNOWN |
FreeBSD | any | noarch | firefox-esr | < 31.4.0,1 | UNKNOWN |
FreeBSD | any | noarch | linux-firefox | < 35.0,1 | UNKNOWN |
FreeBSD | any | noarch | linux-seamonkey | < 2.32 | UNKNOWN |
FreeBSD | any | noarch | linux-thunderbird | < 31.4.0 | UNKNOWN |
FreeBSD | any | noarch | seamonkey | < 2.32 | UNKNOWN |
FreeBSD | any | noarch | thunderbird | < 31.4.0 | UNKNOWN |
FreeBSD | any | noarch | libxul | < 31.4.0 | UNKNOWN |
www.mozilla.org/en-US/security/advisories/mfsa2015-01/
www.mozilla.org/en-US/security/advisories/mfsa2015-02/
www.mozilla.org/en-US/security/advisories/mfsa2015-03/
www.mozilla.org/en-US/security/advisories/mfsa2015-04/
www.mozilla.org/en-US/security/advisories/mfsa2015-05/
www.mozilla.org/en-US/security/advisories/mfsa2015-06/
www.mozilla.org/en-US/security/advisories/mfsa2015-07/
www.mozilla.org/en-US/security/advisories/mfsa2015-08/
www.mozilla.org/en-US/security/advisories/mfsa2015-09/
www.mozilla.org/security/advisories/