Search for vulnerabilities
Vulnerability details: VCID-c8je-szqb-u3e2
Vulnerability ID VCID-c8je-szqb-u3e2
Aliases CVE-2014-1529
Summary Security researcher Mariusz Mlynski discovered an issue where sites that have been given notification permissions by a user can bypass security checks on source components for the Web Notification API. This allows for script to be run in a privileged context through notifications, leading to arbitrary code execution on these sites. In general this flaw cannot be exploited through email in the Thunderbird and Seamonkey products because scripting is disabled, but is potentially a risk in browser or browser-like contexts.
Status Published
Exploitability 0.5
Weighted Severity 9.0
Risk 4.5
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
System Score Found at
epss 0.00906 https://api.first.org/data/v1/epss?cve=CVE-2014-1529
epss 0.00906 https://api.first.org/data/v1/epss?cve=CVE-2014-1529
epss 0.00906 https://api.first.org/data/v1/epss?cve=CVE-2014-1529
epss 0.00906 https://api.first.org/data/v1/epss?cve=CVE-2014-1529
epss 0.00906 https://api.first.org/data/v1/epss?cve=CVE-2014-1529
epss 0.00906 https://api.first.org/data/v1/epss?cve=CVE-2014-1529
epss 0.00906 https://api.first.org/data/v1/epss?cve=CVE-2014-1529
epss 0.00906 https://api.first.org/data/v1/epss?cve=CVE-2014-1529
epss 0.00906 https://api.first.org/data/v1/epss?cve=CVE-2014-1529
epss 0.00906 https://api.first.org/data/v1/epss?cve=CVE-2014-1529
epss 0.00906 https://api.first.org/data/v1/epss?cve=CVE-2014-1529
epss 0.00906 https://api.first.org/data/v1/epss?cve=CVE-2014-1529
epss 0.00906 https://api.first.org/data/v1/epss?cve=CVE-2014-1529
epss 0.00906 https://api.first.org/data/v1/epss?cve=CVE-2014-1529
epss 0.00906 https://api.first.org/data/v1/epss?cve=CVE-2014-1529
epss 0.00906 https://api.first.org/data/v1/epss?cve=CVE-2014-1529
epss 0.00906 https://api.first.org/data/v1/epss?cve=CVE-2014-1529
epss 0.00906 https://api.first.org/data/v1/epss?cve=CVE-2014-1529
epss 0.00906 https://api.first.org/data/v1/epss?cve=CVE-2014-1529
epss 0.00906 https://api.first.org/data/v1/epss?cve=CVE-2014-1529
epss 0.00906 https://api.first.org/data/v1/epss?cve=CVE-2014-1529
epss 0.00906 https://api.first.org/data/v1/epss?cve=CVE-2014-1529
epss 0.00906 https://api.first.org/data/v1/epss?cve=CVE-2014-1529
epss 0.00906 https://api.first.org/data/v1/epss?cve=CVE-2014-1529
epss 0.00906 https://api.first.org/data/v1/epss?cve=CVE-2014-1529
epss 0.00906 https://api.first.org/data/v1/epss?cve=CVE-2014-1529
generic_textual critical https://www.mozilla.org/en-US/security/advisories/mfsa2014-42
No exploits are available.
Exploit Prediction Scoring System (EPSS)
Percentile 0.74803
EPSS Score 0.00906
Published At July 30, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:10:42.696589+00:00 Mozilla Importer Import https://github.com/mozilla/foundation-security-advisories/blob/master/announce/2014/mfsa2014-42.md 37.0.0