A vulnerability, which was classified as critical, has been found in Mozilla Firefox 39. Affected by this issue is some unknown functionality of the component MPEG4 Video File Handler. The manipulation as part of ESDS Chunk leads to memory corruption.
This vulnerability is handled as CVE-2015-4493. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Mozilla Firefox up to 40.0.2. It has been classified as critical. This affects an unknown part of the component Add-on Installation. The manipulation leads to 7pk security features.
This vulnerability is uniquely identified as CVE-2015-4498. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Mozilla Firefox up to 40.0.2. It has been declared as critical. This vulnerability affects unknown code of the component nsIPresShell. The manipulation leads to use after free.
This vulnerability was named CVE-2015-4497. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Mozilla Firefox up to 40. This affects an unknown part of the component Browser Engine. The manipulation leads to memory corruption.
This vulnerability is uniquely identified as CVE-2015-4500. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Mozilla Firefox up to 40 on Windows and classified as problematic. Affected by this issue is some unknown functionality of the file updater.exe of the component Maintenance Service. The manipulation leads to improper access controls (File).
This vulnerability is handled as CVE-2015-4505. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Mozilla Firefox up to 40. It has been classified as critical. This affects the function vp9_init_context_buffers of the component Libvpx. The manipulation as part of VP9 File leads to memory corruption.
This vulnerability is uniquely identified as CVE-2015-4506. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Mozilla Firefox up to 40. Affected is an unknown function of the component HTMLVideoElement Interface. The manipulation leads to use after free.
This vulnerability is traded as CVE-2015-4509. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Mozilla Firefox up to 40. Affected by this issue is the function nestegg_track_codec_data of the component WebM Video Handler. The manipulation leads to memory corruption.
This vulnerability is handled as CVE-2015-4511. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Mozilla Firefox up to 40 and classified as critical. This issue affects some unknown processing of the file NetworkUtils.cpp. The manipulation leads to memory corruption.
The identification of this vulnerability is CVE-2015-4517. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Mozilla Firefox up to 40. It has been classified as critical. Affected is an unknown function of the component JavaScript Handler. The manipulation leads to information disclosure.
This vulnerability is traded as CVE-2015-4519. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Mozilla Firefox up to 40. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component CORS Preflight Protection Handler. The manipulation leads to 7pk security features.
This vulnerability is known as CVE-2015-4520. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Mozilla Firefox up to 40. It has been rated as critical. Affected by this issue is the function ConvertDialogOptions. The manipulation leads to memory corruption.
This vulnerability is handled as CVE-2015-4521. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Mozilla Firefox up to 40. This affects the function nsUnicodeToUTF8::GetMaxLength. The manipulation leads to memory corruption.
This vulnerability is uniquely identified as CVE-2015-4522. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Mozilla Firefox up to 40. Affected is the function nsAttrAndChildArray::GrowBy. The manipulation leads to memory corruption.
This vulnerability is traded as CVE-2015-7174. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
Socket Plans to Triple Headcount After Big Growth, Deliver Open-Source Tools Faster A $40 million Series B investment will support Socket in rapidly scaling its team and product development. Following a 400% revenue increase, the company plans to build on its success by expanding its application security offerings and enterprise support for more programming languages.
PSR's Kate Fitzgerald on Steps for Reducing APP Fraud, Complying With New Mandates While the U.K. Payment Systems Regulator is taking steps to ensure customers receive consistent treatment from banks, fraud protection still has inconsistencies. Several policies have been introduced to protect fraud victims, but consumers can't always count on them, said PSR’s Kate Fitzgerald.
SANS Survey Finds Incident Detection Improving More incidents, vulnerability remediation timelines that can stretch into a year and mismatched budget priorities - such is the state of operational technology cybersecurity in 2024, according to participants in an annual SANS survey. Incident response remains a weak point.
Why Peter Todd May Be Another Conspiracy Theory on the Bitcoin Creator Is Peter Todd truly Satoshi Nakamoto, or just the next name in a long list of conspiracy theories that are eventually debunked? The HBO documentary's claim is far from conclusive, despite an eyebrow-raising moment in the film, where Todd admits to being Nakamoto on camera, seemingly tongue in cheek.