Use-after-free vulnerability in the CanonicalizeXPCOMParticipant function in Mozilla Firefox before 39.0 and Firefox ESR 31.x before 31.8 and 38.x before 38.1 allows remote attackers to execute arbitrary code via vectors involving attachment of an XMLHttpRequest object to a dedicated worker.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
21 Nov 2024, 02:27
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html - Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html - Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2015-1207.html - | |
References | () http://www.mozilla.org/security/announce/2015/mfsa2015-65.html - Vendor Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html - Third Party Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html - Third Party Advisory | |
References | () http://www.securityfocus.com/bid/75541 - | |
References | () http://www.securitytracker.com/id/1032783 - | |
References | () http://www.securitytracker.com/id/1032784 - | |
References | () http://www.ubuntu.com/usn/USN-2656-1 - | |
References | () http://www.ubuntu.com/usn/USN-2656-2 - | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=1169867 - Issue Tracking | |
References | () https://security.gentoo.org/glsa/201512-10 - |
22 Oct 2024, 13:54
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:mozilla:firefox:31.5.1:*:*:*:*:*:*:* |
22 Oct 2024, 13:42
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:* |
21 Oct 2024, 13:55
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:mozilla:firefox_esr:31.0:*:*:*:*:*:*:* |
cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:* |
21 Oct 2024, 13:11
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:mozilla:firefox_esr:31.5.2:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:31.1.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:31.5.3:*:*:*:*:*:*:* |
cpe:2.3:a:mozilla:firefox:31.5.2:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:31.1.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:31.3.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:31.5.3:*:*:*:*:*:*:* |
Information
Published : 2015-07-06 02:01
Updated : 2024-11-21 02:27
NVD link : CVE-2015-2733
Mitre link : CVE-2015-2733
CVE.ORG link : CVE-2015-2733
JSON object : View
Products Affected
novell
- suse_linux_enterprise_desktop
- suse_linux_enterprise_server
oracle
- solaris
mozilla
- firefox
- firefox_esr
CWE