4.3
CVSSv2

CVE-2014-1499

Published: 19/03/2014 Updated: 14/08/2020
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

Mozilla Firefox prior to 28.0 and SeaMonkey prior to 2.25 allow remote malicious users to spoof the domain name in the WebRTC (1) camera or (2) microphone permission prompt by triggering navigation at a certain time during generation of this prompt.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

suse linux enterprise desktop 11

suse linux enterprise server 11

suse linux enterprise software development kit 11

mozilla seamonkey

oracle solaris 11.3

mozilla firefox

opensuse project opensuse 11.4

opensuse opensuse 13.1

opensuse project opensuse 12.3

Vendor Advisories

Firefox could be made to crash or run programs as your login if it opened a malicious website ...
Mozilla Foundation Security Advisory 2014-19 Spoofing attack on WebRTC permission prompt Announced March 18, 2014 Reporter Ehsan Akhgari Impact Moderate Products Firefox, SeaMonkey Fixed in ...