10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.264 Low
EPSS
Percentile
96.8%
The Mozilla Project reports:
MFSA 2014-66 IFRAME sandbox same-origin access through
redirect
MFSA 2014-65 Certificate parsing broken by non-standard
character encoding
MFSA 2014-64 Crash in Skia library when scaling high
quality images
MFSA 2014-63 Use-after-free while when manipulating
certificates in the trusted cache
MFSA 2014-62 Exploitable WebGL crash with Cesium
JavaScript library
MFSA 2014-61 Use-after-free with FireOnStateChange
event
MFSA 2014-60 Toolbar dialog customization event
spoofing
MFSA 2014-59 Use-after-free in DirectWrite font
handling
MFSA 2014-58 Use-after-free in Web Audio due to
incorrect control message ordering
MFSA 2014-57 Buffer overflow during Web Audio
buffering for playback
MFSA 2014-56 Miscellaneous memory safety hazards
(rv:31.0 / rv:24.7)
www.mozilla.org/security/announce/
www.mozilla.org/security/announce/2014/mfsa2014-56.html
www.mozilla.org/security/announce/2014/mfsa2014-57.html
www.mozilla.org/security/announce/2014/mfsa2014-58.html
www.mozilla.org/security/announce/2014/mfsa2014-59.html
www.mozilla.org/security/announce/2014/mfsa2014-60.html
www.mozilla.org/security/announce/2014/mfsa2014-61.html
www.mozilla.org/security/announce/2014/mfsa2014-62.html
www.mozilla.org/security/announce/2014/mfsa2014-63.html
www.mozilla.org/security/announce/2014/mfsa2014-64.html
www.mozilla.org/security/announce/2014/mfsa2014-65.html
www.mozilla.org/security/announce/2014/mfsa2014-66.html