6.4
CVSSv2

CVE-2015-4520

Published: 24/09/2015 Updated: 22/12/2016
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
VMScore: 570
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N

Vulnerability Summary

Mozilla Firefox prior to 41.0 and Firefox ESR 38.x prior to 38.3 allow remote malicious users to bypass CORS preflight protection mechanisms by leveraging (1) duplicate cache-key generation or (2) retrieval of a value from an incorrect HTTP Access-Control-* response header.

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla firefox esr 38.2.1

mozilla firefox esr 38.1.1

mozilla firefox esr 38.2.0

mozilla firefox esr 38.0.5

mozilla firefox esr 38.1.0

mozilla firefox esr 38.0

mozilla firefox esr 38.0.1

mozilla firefox

Vendor Advisories

Multiple security issues have been found in Iceweasel, Debian's version of the Mozilla Firefox web browser: Multiple memory safety errors, integer overflows, buffer overflows, use-after-frees and other implementation errors may lead to the execution of arbitrary code, information disclosure or denial of service For the oldstable distribution (whee ...
Firefox could be made to crash or run programs as your login if it opened a malicious website ...
This update provides compatible packages for Firefox 41 ...
USN-2743-1 introduced a regression in Firefox ...
Several security issues were fixed in Thunderbird ...
Mozilla Foundation Security Advisory 2015-111 Errors in the handling of CORS preflight request headers Announced September 22, 2015 Reporter Ehsan Akhgari Impact High Products Firefox, Firefox ESR, Firefox OS, SeaMonkey, Thun ...