CVE-2015-2731

CVSS v2.0 10 (High)
100% Progress
EPSS 4.36 % (93th)
4.36% Progress
Affected Products 4
Advisories 9

Use-after-free vulnerability in the CSPService::ShouldLoad function in the microtask implementation in Mozilla Firefox before 39.0, Firefox ESR 38.x before 38.1, and Thunderbird before 38.1 allows remote attackers to execute arbitrary code by leveraging client-side JavaScript that triggers removal of a DOM object on the basis of a Content Policy.

Weaknesses
CWE-NVD-Other
CVE Status
PUBLISHED
CNA
Mozilla Corporation
Published Date
2015-07-06 02:01:02
(9 years ago)
Updated Date
2016-12-28 02:59:08
(7 years ago)

Affected Products

Loading...
Loading...

Configuration #1

    CPE23 From Up To
  Mozilla Firefox 38.1.0 and prior versions cpe:2.3:a:mozilla:firefox <= 38.1.0

Configuration #2

    CPE23 From Up To
  Mozilla Thunderbird 38.0.1 and prior versions cpe:2.3:a:mozilla:thunderbird <= 38.0.1

Configuration #3

    CPE23 From Up To
  Oracle Solaris 11.3 cpe:2.3:o:oracle:solaris:11.3

Configuration #4

    CPE23 From Up To
  Mozilla Firefox Esr 31.0 cpe:2.3:a:mozilla:firefox_esr:31.0
  Mozilla Firefox Esr 31.1 cpe:2.3:a:mozilla:firefox_esr:31.1
  Mozilla Firefox Esr 31.1.0 cpe:2.3:a:mozilla:firefox_esr:31.1.0
  Mozilla Firefox Esr 31.1.1 cpe:2.3:a:mozilla:firefox_esr:31.1.1
  Mozilla Firefox Esr 31.2 cpe:2.3:a:mozilla:firefox_esr:31.2
  Mozilla Firefox Esr 31.3 cpe:2.3:a:mozilla:firefox_esr:31.3
  Mozilla Firefox Esr 31.3.0 cpe:2.3:a:mozilla:firefox_esr:31.3.0
  Mozilla Firefox Esr 31.4 cpe:2.3:a:mozilla:firefox_esr:31.4
  Mozilla Firefox Esr 31.5 cpe:2.3:a:mozilla:firefox_esr:31.5
  Mozilla Firefox Esr 31.5.1 cpe:2.3:a:mozilla:firefox_esr:31.5.1
  Mozilla Firefox Esr 31.5.2 cpe:2.3:a:mozilla:firefox_esr:31.5.2
  Mozilla Firefox Esr 31.5.3 cpe:2.3:a:mozilla:firefox_esr:31.5.3
  Mozilla Firefox Esr 31.6.0 cpe:2.3:a:mozilla:firefox_esr:31.6.0
  Mozilla Firefox Esr 31.7.0 cpe:2.3:a:mozilla:firefox_esr:31.7.0
  Mozilla Firefox Esr 38.0 cpe:2.3:a:mozilla:firefox_esr:38.0
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...