5
CVSSv2

CVE-2015-4478

Published: 16/08/2015 Updated: 30/10/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

Mozilla Firefox prior to 40.0 and Firefox ESR 38.x prior to 38.2 do not impose certain ECMAScript 6 requirements on JavaScript object properties, which allows remote malicious users to bypass the Same Origin Policy via the reviver parameter to the JSON.parse method.

Vulnerable Product Search on Vulmon Subscribe to Product

canonical ubuntu linux 15.04

opensuse opensuse 13.1

opensuse opensuse 13.2

canonical ubuntu linux 12.04

canonical ubuntu linux 14.04

mozilla firefox

mozilla firefox esr 38.0.1

mozilla firefox esr 38.0

mozilla firefox esr 38.1.0

mozilla firefox esr 38.0.5

Vendor Advisories

This update provides compatible packages for Firefox 40 ...
Firefox could be made to crash or run programs as your login if it opened a malicious website ...
USN-2702-1 introduced a regression in Firefox ...
Multiple security issues have been found in Iceweasel, Debian's version of the Mozilla Firefox web browser: Multiple memory safety errors, integer overflows, buffer overflows, use-after-frees and other implementation errors may lead to the execution of arbitrary code, bypass of the same-origin policy or denial of service Debian follows the extende ...
Mozilla Foundation Security Advisory 2015-82 Redefinition of non-configurable JavaScript object properties Announced August 11, 2015 Reporter André Bargull Impact High Products Firefox, Firefox ESR, SeaMonkey Fixed in ...
Mozilla Firefox before 400 and Firefox ESR 38x before 382 do not impose certain ECMAScript 6 requirements on JavaScript object properties, which allows remote attackers to bypass the Same Origin Policy via the reviver parameter to the JSONparse method ...