Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
mozilla firefox 33.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2014-1591
Mozilla Firefox 33.0 and SeaMonkey prior to 2.31 include path strings in CSP violation reports, which allows remote malicious users to obtain sensitive information via a web site that receives a report after a redirect.
Mozilla Firefox 33.0
Mozilla Seamonkey
NA
CVE-2014-1575
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox prior to 33.0 allow remote malicious users to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to improper interaction between t...
Mozilla Firefox
Mozilla Firefox 31.0
Mozilla Firefox 30.0
Mozilla Firefox 31.1.0
NA
CVE-2014-1580
Mozilla Firefox prior to 33.0 does not properly initialize memory for GIF images, which allows remote malicious users to obtain sensitive information from process memory via a crafted web page that triggers a sequence of rendering operations for truncated GIF data within a CANVAS...
Mozilla Firefox
Mozilla Firefox 31.0
Mozilla Firefox 30.0
Mozilla Firefox 31.1.0
NA
CVE-2014-1584
The Public Key Pinning (PKP) implementation in Mozilla Firefox prior to 33.0 skips pinning checks upon an unspecified issuer-verification error, which makes it easier for remote malicious users to bypass an intended pinning configuration and spoof a web site via a crafted certifi...
Mozilla Firefox
Mozilla Firefox 31.0
Mozilla Firefox 30.0
Mozilla Firefox 31.1.0
NA
CVE-2014-1582
The Public Key Pinning (PKP) implementation in Mozilla Firefox prior to 33.0 does not properly consider the connection-coalescing behavior of SPDY and HTTP/2 in the case of a shared IP address, which allows man-in-the-middle malicious users to bypass an intended pinning configura...
Mozilla Firefox
Mozilla Firefox 31.0
Mozilla Firefox 30.0
Mozilla Firefox 31.1.0
NA
CVE-2015-0821
Mozilla Firefox prior to 36.0 allows user-assisted remote malicious users to read arbitrary files or execute arbitrary JavaScript code with chrome privileges via a crafted web site that is accessed with unspecified mouse and keyboard actions.
Mozilla Firefox 13.0.1
Mozilla Firefox 14.0.1
Mozilla Firefox 18.0
Mozilla Firefox 0.1
Mozilla Firefox 10.0.7
Mozilla Firefox 4.0
Mozilla Firefox 3.6.2
Mozilla Firefox 19.0
Mozilla Firefox 0.8
Mozilla Firefox 2.0.0.12
Mozilla Firefox 3.5.18
Mozilla Firefox 1.5
Mozilla Firefox 3.6.28
Mozilla Firefox 3.0.17
Mozilla Firefox 3.5.3
Mozilla Firefox 26.0
Mozilla Firefox 18.0.2
Mozilla Firefox 3.0.7
Mozilla Firefox 1.5.2
Mozilla Firefox 15.0.1
Mozilla Firefox 8.0
Mozilla Firefox 3.0.9
NA
CVE-2015-0824
The mozilla::layers::BufferTextureClient::AllocateForSurface function in Mozilla Firefox prior to 36.0 allows remote malicious users to cause a denial of service (out-of-bounds write of zero values, and application crash) via vectors that trigger use of DrawTarget and the Cairo l...
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
Mozilla Firefox 13.0.1
Mozilla Firefox 14.0.1
Mozilla Firefox 18.0
Mozilla Firefox 0.1
Mozilla Firefox 10.0.7
Mozilla Firefox 4.0
Mozilla Firefox 3.6.2
Mozilla Firefox 19.0
Mozilla Firefox 0.8
Mozilla Firefox 2.0.0.12
Mozilla Firefox 3.5.18
Mozilla Firefox 1.5
Mozilla Firefox 3.6.28
Mozilla Firefox 3.0.17
Mozilla Firefox 3.5.3
Mozilla Firefox 26.0
Mozilla Firefox 18.0.2
NA
CVE-2015-0819
The UITour::onPageEvent function in Mozilla Firefox prior to 36.0 does not ensure that an API call originates from a foreground tab, which allows remote malicious users to conduct spoofing and clickjacking attacks by leveraging access to a UI Tour web site.
Mozilla Firefox 13.0.1
Mozilla Firefox 14.0.1
Mozilla Firefox 18.0
Mozilla Firefox 0.1
Mozilla Firefox 10.0.7
Mozilla Firefox 4.0
Mozilla Firefox 3.6.2
Mozilla Firefox 19.0
Mozilla Firefox 0.8
Mozilla Firefox 2.0.0.12
Mozilla Firefox 3.5.18
Mozilla Firefox 1.5
Mozilla Firefox 3.6.28
Mozilla Firefox 3.0.17
Mozilla Firefox 3.5.3
Mozilla Firefox 26.0
Mozilla Firefox 18.0.2
Mozilla Firefox 3.0.7
Mozilla Firefox 1.5.2
Mozilla Firefox 15.0.1
Mozilla Firefox 8.0
Mozilla Firefox 3.0.9
NA
CVE-2015-0820
Mozilla Firefox prior to 36.0 does not properly restrict transitions of JavaScript objects from a non-extensible state to an extensible state, which allows remote malicious users to bypass a Caja Compiler sandbox protection mechanism or a Secure EcmaScript sandbox protection mech...
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Mozilla Firefox 13.0.1
Mozilla Firefox 14.0.1
Mozilla Firefox 18.0
Mozilla Firefox 0.1
Mozilla Firefox 10.0.7
Mozilla Firefox 4.0
Mozilla Firefox 3.6.2
Mozilla Firefox 19.0
Mozilla Firefox 0.8
Mozilla Firefox 2.0.0.12
Mozilla Firefox 3.5.18
Mozilla Firefox 1.5
Mozilla Firefox 3.6.28
Mozilla Firefox 3.0.17
Mozilla Firefox 3.5.3
Mozilla Firefox 26.0
Mozilla Firefox 18.0.2
Mozilla Firefox 3.0.7
Mozilla Firefox 1.5.2
Mozilla Firefox 15.0.1
NA
CVE-2015-0825
Stack-based buffer underflow in the mozilla::MP3FrameParser::ParseBuffer function in Mozilla Firefox prior to 36.0 allows remote malicious users to obtain sensitive information from process memory via a malformed MP3 file that improperly interacts with memory allocation during pl...
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Mozilla Firefox 13.0.1
Mozilla Firefox 14.0.1
Mozilla Firefox 18.0
Mozilla Firefox 0.1
Mozilla Firefox 10.0.7
Mozilla Firefox 4.0
Mozilla Firefox 3.6.2
Mozilla Firefox 19.0
Mozilla Firefox 0.8
Mozilla Firefox 2.0.0.12
Mozilla Firefox 3.5.18
Mozilla Firefox 1.5
Mozilla Firefox 3.6.28
Mozilla Firefox 3.0.17
Mozilla Firefox 3.5.3
Mozilla Firefox 26.0
Mozilla Firefox 18.0.2
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »