CVE-2015-0802

Scores

EPSS

0.804high80.4%
0%20%40%60%80%100%

Percentile: 80.4%

CVSS

4.3medium2.0
0246810

CVSS Score: 4.3/10

All CVSS Scores

CVSS 2.0
4.3

Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Description

Mozilla Firefox before 37.0 relies on docshell type information instead of page principal information for Window.webidl access control, which might allow remote attackers to execute arbitrary JavaScript code with chrome privileges via certain content navigation that leverages the reachability of a privileged window with an unintended persistence of access to restricted internal methods.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvdubuntu

CWEs

CWE-250CWE-264

Related Vulnerabilities

Exploits

Exploit ID: 37958

Source: exploitdb

URL: https://www.exploit-db.com/exploits/37958

Vulnerable Software (6)

Type: Configuration

Product: firefox

Operating System: ubuntu trusty 14.04

Trait:
{  "fixed": "37.0+build2-0ubuntu0.14.04.1"}

Source: ubuntu

Type: Configuration

Product: firefox

Operating System: ubuntu utopic 14.10

Trait:
{  "fixed": "37.0+build2-0ubuntu0.14.10.1"}

Source: ubuntu

Type: Configuration

Product: iceweasel

Operating System: debian

Trait:
{  "unaffected": true}

Source: debian

Type: Configuration

Vendor: *

Product: firefox

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",      "versionEndIncluding": "36.0.4",      "vulnerable": true    }  ],  "operator": "OR"}

Source: nvd

Type: Configuration

Vendor: *

Product: opensuse

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", ...

Source: nvd

Type: Configuration

Vendor: *

Product: ubuntu_linux

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*...

Source: nvd

End of list