Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
mozilla network security services 3.15.1 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2013-5606
The CERT_VerifyCert function in lib/certhigh/certvfy.c in Mozilla Network Security Services (NSS) 3.15 prior to 3.15.3 provides an unexpected return value for an incompatible key-usage certificate when the CERTVerifyLog argument is valid, which might allow remote malicious users ...
Mozilla Network Security Services 3.15
Mozilla Network Security Services 3.15.1
Mozilla Network Security Services 3.15.2
NA
CVE-2013-1741
Integer overflow in Mozilla Network Security Services (NSS) 3.15 prior to 3.15.3 allows remote malicious users to cause a denial of service or possibly have unspecified other impact via a large size value.
Mozilla Network Security Services 3.15
Mozilla Network Security Services 3.15.1
Mozilla Network Security Services 3.15.2
NA
CVE-2013-5605
Mozilla Network Security Services (NSS) 3.14 prior to 3.14.5 and 3.15 prior to 3.15.3 allows remote malicious users to cause a denial of service or possibly have unspecified other impact via invalid handshake packets.
Mozilla Network Security Services 3.15
Mozilla Network Security Services 3.14.1
Mozilla Network Security Services 3.15.1
Mozilla Network Security Services 3.14.3
Mozilla Network Security Services 3.14.4
Mozilla Network Security Services 3.14
Mozilla Network Security Services 3.15.2
Mozilla Network Security Services 3.14.2
NA
CVE-2014-1492
The cert_TestHostName function in lib/certdb/certdb.c in the certificate-checking implementation in Mozilla Network Security Services (NSS) prior to 3.16 accepts a wildcard character that is embedded in an internationalized domain name's U-label, which might allow man-in-the...
Mozilla Network Security Services 3.11.2
Mozilla Network Security Services 3.6.1
Mozilla Network Security Services 3.12.5
Mozilla Network Security Services 3.2
Mozilla Network Security Services 3.15
Mozilla Network Security Services 3.11.4
Mozilla Network Security Services 3.7.7
Mozilla Network Security Services 3.14.1
Mozilla Network Security Services 3.7.5
Mozilla Network Security Services 3.7.1
Mozilla Network Security Services 3.12.9
Mozilla Network Security Services 3.15.3
Mozilla Network Security Services 3.12.3.1
Mozilla Network Security Services 3.6
Mozilla Network Security Services 3.12.6
Mozilla Network Security Services 3.2.1
Mozilla Network Security Services 3.12.8
Mozilla Network Security Services
Mozilla Network Security Services 3.15.1
Mozilla Network Security Services 3.12.11
Mozilla Network Security Services 3.14.3
Mozilla Network Security Services 3.14.4
NA
CVE-2014-1544
Use-after-free vulnerability in the CERT_DestroyCertificate function in libnss3.so in Mozilla Network Security Services (NSS) 3.x, as used in Firefox prior to 31.0, Firefox ESR 24.x prior to 24.7, and Thunderbird prior to 24.7, allows remote malicious users to execute arbitrary c...
Mozilla Network Security Services 3.11.2
Mozilla Network Security Services 3.6.1
Mozilla Network Security Services 3.12.5
Mozilla Network Security Services 3.2
Mozilla Network Security Services 3.15
Mozilla Firefox Esr 24.5
Mozilla Network Security Services 3.11.4
Mozilla Network Security Services 3.7.7
Mozilla Network Security Services 3.14.1
Mozilla Network Security Services 3.7.5
Mozilla Network Security Services 3.7.1
Mozilla Network Security Services 3.12.9
Mozilla Firefox Esr 24.2
Mozilla Network Security Services 3.15.3
Mozilla Network Security Services 3.12.3.1
Mozilla Network Security Services 3.6
Mozilla Thunderbird 24.0.1
Mozilla Network Security Services 3.12.6
Mozilla Network Security Services 3.2.1
Mozilla Network Security Services 3.12.8
Mozilla Thunderbird 24.2
Mozilla Network Security Services 3.15.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started