Search for vulnerabilities
Vulnerability ID | VCID-c8je-szqb-u3e2 |
Aliases |
CVE-2014-1529
|
Summary | Security researcher Mariusz Mlynski discovered an issue where sites that have been given notification permissions by a user can bypass security checks on source components for the Web Notification API. This allows for script to be run in a privileged context through notifications, leading to arbitrary code execution on these sites. In general this flaw cannot be exploited through email in the Thunderbird and Seamonkey products because scripting is disabled, but is potentially a risk in browser or browser-like contexts. |
Status | Published |
Exploitability | 0.5 |
Weighted Severity | 9.0 |
Risk | 4.5 |
Affected and Fixed Packages | Package Details |
There are no known CWE. |
Reference id | Reference type | URL |
---|---|---|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1529.json | ||
https://api.first.org/data/v1/epss?cve=CVE-2014-1529 | ||
1092664 | https://bugzilla.redhat.com/show_bug.cgi?id=1092664 | |
CVE-2014-1529 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529 | |
mfsa2014-42 | https://www.mozilla.org/en-US/security/advisories/mfsa2014-42 | |
RHSA-2014:0448 | https://access.redhat.com/errata/RHSA-2014:0448 | |
RHSA-2014:0449 | https://access.redhat.com/errata/RHSA-2014:0449 | |
USN-2185-1 | https://usn.ubuntu.com/2185-1/ | |
USN-2189-1 | https://usn.ubuntu.com/2189-1/ |
Percentile | 0.74803 |
EPSS Score | 0.00906 |
Published At | July 30, 2025, 12:55 p.m. |
Date | Actor | Action | Source | VulnerableCode Version |
---|---|---|---|---|
2025-07-31T08:10:42.696589+00:00 | Mozilla Importer | Import | https://github.com/mozilla/foundation-security-advisories/blob/master/announce/2014/mfsa2014-42.md | 37.0.0 |