Логотип exploitDog
bind:"CVE-2014-8634" OR bind:"CVE-2014-8638" OR bind:"CVE-2014-8639" OR bind:"CVE-2014-8641"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2014-8634" OR bind:"CVE-2014-8638" OR bind:"CVE-2014-8639" OR bind:"CVE-2014-8641"

Количество 22

Количество 22

github логотип

GHSA-ccgg-x9xx-x49v

больше 3 лет назад

Use-after-free vulnerability in the WebRTC implementation in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, and SeaMonkey before 2.32 allows remote attackers to execute arbitrary code via crafted track data.

EPSS: Низкий
github логотип

GHSA-cfgr-xpqw-rcxf

больше 3 лет назад

Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, Thunderbird before 31.4, and SeaMonkey before 2.32 do not properly interpret Set-Cookie headers within responses that have a 407 (aka Proxy Authentication Required) status code, which allows remote HTTP proxy servers to conduct session fixation attacks by providing a cookie name that corresponds to the session cookie of the origin server.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-ccgg-x9xx-x49v

Use-after-free vulnerability in the WebRTC implementation in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, and SeaMonkey before 2.32 allows remote attackers to execute arbitrary code via crafted track data.

2%
Низкий
больше 3 лет назад
github логотип
GHSA-cfgr-xpqw-rcxf

Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, Thunderbird before 31.4, and SeaMonkey before 2.32 do not properly interpret Set-Cookie headers within responses that have a 407 (aka Proxy Authentication Required) status code, which allows remote HTTP proxy servers to conduct session fixation attacks by providing a cookie name that corresponds to the session cookie of the origin server.

1%
Низкий
больше 3 лет назад

Уязвимостей на страницу