CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
AI Score
Confidence
High
EPSS
Percentile
93.8%
Multiple serious vulnerabilities have been found in Mozilla products. Malicious users can exploit these vulnerabilities to cause denial of service, gain privilleges, obtain sensitiv information, execute arbitrary code, spoof user interface or read local files.
Below is a complete list of vulnerabilities
CVE-2015-0823 critical
CVE-2015-0828 high
CVE-2015-0834 warning
CVE-2015-0835 critical
CVE-2015-0836 critical
CVE-2015-0825 warning
CVE-2015-0831 high
CVE-2015-0830 critical
CVE-2015-0824 critical
CVE-2015-0827 warning
CVE-2015-0829 high
CVE-2015-0822 warning
CVE-2015-0833 high
CVE-2015-0826 high
CVE-2015-0820 warning
CVE-2015-0832 critical
CVE-2015-0821 high
CVE-2015-0819 warning
Update to latest version!
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
Read Local Files. Exploitation of vulnerabilities with this impact can lead to reading some inaccessible files. Files that can be read depends on conΡrete program errors.
Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.