10
CVSSv2

CVE-2015-2731

Published: 06/07/2015 Updated: 28/12/2016
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Use-after-free vulnerability in the CSPService::ShouldLoad function in the microtask implementation in Mozilla Firefox prior to 39.0, Firefox ESR 38.x prior to 38.1, and Thunderbird prior to 38.1 allows remote malicious users to execute arbitrary code by leveraging client-side JavaScript that triggers removal of a DOM object on the basis of a Content Policy.

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla firefox

mozilla thunderbird

oracle solaris 11.3

mozilla firefox esr 31.5.2

mozilla firefox esr 31.5.1

mozilla firefox esr 31.1

mozilla firefox esr 31.0

mozilla firefox esr 38.0

mozilla firefox esr 31.7.0

mozilla firefox esr 31.3.0

mozilla firefox esr 31.3

mozilla firefox esr 31.2

mozilla firefox esr 31.5

mozilla firefox esr 31.4

mozilla firefox esr 31.6.0

mozilla firefox esr 31.5.3

mozilla firefox esr 31.1.1

mozilla firefox esr 31.1.0

Vendor Advisories

Multiple security issues have been found in Iceweasel, Debian's version of the Mozilla Firefox web browser: Multiple memory safety errors, use-after-frees and other implementation errors may lead to the execution of arbitrary code or denial of service This update also addresses a vulnerability in DHE key processing commonly known as the LogJam vul ...
Firefox could be made to crash or run programs as your login if it opened a malicious website ...
Firefox could be made to crash or run programs as your login if it opened a malicious website ...
Mozilla Foundation Security Advisory 2015-63 Use-after-free in Content Policy due to microtask execution error Announced July 2, 2015 Reporter Herre Impact Critical Products Firefox, Firefox ESR, SeaMonkey, Thunderbird ...
Use-after-free vulnerability in the CSPService::ShouldLoad function in the microtask implementation in Mozilla Firefox before 390, Firefox ESR 38x before 381, and Thunderbird before 381 allows remote attackers to execute arbitrary code by leveraging client-side JavaScript that triggers removal of a DOM object on the basis of a Content Policy ...