4.3
CVSSv2

CVE-2015-4519

Published: 24/09/2015 Updated: 22/12/2016
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

Mozilla Firefox prior to 41.0 and Firefox ESR 38.x prior to 38.3 allow user-assisted remote malicious users to bypass intended access restrictions and discover a redirect's target URL via crafted JavaScript code that executes after a drag-and-drop action of an image into a TEXTBOX element.

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla firefox esr 38.1.1

mozilla firefox esr 38.2.0

mozilla firefox esr 38.0.1

mozilla firefox esr 38.0.5

mozilla firefox esr 38.1.0

mozilla firefox esr 38.2.1

mozilla firefox esr 38.0

mozilla firefox

Vendor Advisories

Multiple security issues have been found in Iceweasel, Debian's version of the Mozilla Firefox web browser: Multiple memory safety errors, integer overflows, buffer overflows, use-after-frees and other implementation errors may lead to the execution of arbitrary code, information disclosure or denial of service For the oldstable distribution (whee ...
Firefox could be made to crash or run programs as your login if it opened a malicious website ...
This update provides compatible packages for Firefox 41 ...
USN-2743-1 introduced a regression in Firefox ...
Several security issues were fixed in Thunderbird ...
Mozilla Foundation Security Advisory 2015-110 Dragging and dropping images exposes final URL after redirects Announced September 22, 2015 Reporter Mario Gomes Impact Moderate Products Firefox, Firefox ESR, Firefox OS, SeaMonk ...