Use-after-free vulnerability in the CSPService::ShouldLoad function in the microtask implementation in Mozilla Firefox before 39.0, Firefox ESR 38.x before 38.1, and Thunderbird before 38.1 allows remote attackers to execute arbitrary code by leveraging client-side JavaScript that triggers removal of a DOM object on the basis of a Content Policy.
Metrics
Affected Vendors & Products
References
History
Tue, 22 Oct 2024 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:mozilla:firefox:31.5.1:*:*:*:*:*:*:* |
Tue, 22 Oct 2024 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:* |
Mon, 21 Oct 2024 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:mozilla:firefox_esr:31.1.0:*:*:*:*:*:*:* |
cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:* |
Mon, 21 Oct 2024 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:mozilla:firefox_esr:31.3.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:31.5.2:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:31.5.3:*:*:*:*:*:*:* |
cpe:2.3:a:mozilla:firefox:31.1.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:31.3.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:31.5.2:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:31.5.3:*:*:*:*:*:*:* |

Status: PUBLISHED
Assigner: mozilla
Published:
Updated: 2024-08-06T05:24:38.497Z
Reserved: 2015-03-25T00:00:00
Link: CVE-2015-2731

No data.

Status : Modified
Published: 2015-07-06T02:01:02.110
Modified: 2024-11-21T02:27:56.170
Link: CVE-2015-2731
