7.5
CVSSv2

CVE-2015-7193

Published: 05/11/2015 Updated: 07/12/2016
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Mozilla Firefox prior to 42.0 and Firefox ESR 38.x prior to 38.4 improperly follow the CORS cross-origin request algorithm for the POST method in situations involving an unspecified Content-Type header manipulation, which allows remote malicious users to bypass the Same Origin Policy by leveraging the lack of a preflight-request step.

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla firefox esr 38.0

mozilla firefox esr 38.0.1

mozilla firefox esr 38.1.1

mozilla firefox esr 38.2.0

mozilla firefox esr 38.2.1

mozilla firefox esr 38.3.0

mozilla firefox esr 38.0.5

mozilla firefox esr 38.1.0

mozilla firefox

Vendor Advisories

Synopsis Important: thunderbird security update Type/Severity Security Advisory: Important Topic An updated thunderbird package that fixes multiple security issues is nowavailable for Red Hat Enterprise Linux 5, 6, and 7Red Hat Product Security has rated this update as having Important securityimpact Comm ...
Firefox could be made to crash or run programs as your login if it opened a malicious website ...
Several security issues were fixed in Thunderbird ...
Multiple security issues have been found in Icedove, Debian's version of the Mozilla Thunderbird mail client: Multiple memory safety errors, integer overflows, buffer overflows and other implementation errors may lead to the execution of arbitrary code or denial of service For the oldstable distribution (wheezy), these problems have been fixed in ...
Multiple security issues have been found in Iceweasel, Debian's version of the Mozilla Firefox web browser: Multiple memory safety errors, integer overflows, buffer overflows and other implementation errors may lead to the execution of arbitrary code, information disclosure or denial of service For the oldstable distribution (wheezy), these proble ...
Mozilla Foundation Security Advisory 2015-127 CORS preflight is bypassed when non-standard Content-Type headers are received Announced November 3, 2015 Reporter Shinto K Anto Impact High Products Firefox, Firefox ESR, Firefo ...
Mozilla Firefox before 420 and Firefox ESR 38x before 384 improperly follow the CORS cross-origin request algorithm for the POST method in situations involving an unspecified Content-Type header manipulation, which allows remote attackers to bypass the Same Origin Policy by leveraging the lack of a preflight-request step ...