The add-on installation feature in Mozilla Firefox before 40.0.3 and Firefox ESR 38.x before 38.2.1 allows remote attackers to bypass an intended user-confirmation requirement by constructing a crafted data: URL and triggering navigation to an arbitrary http: or https: URL at a certain early point in the installation process.
Metrics
Affected Vendors & Products
References
History
Tue, 22 Oct 2024 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:mozilla:firefox_esr:38.0.5:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:38.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:38.1.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:38.2.0:*:*:*:*:*:*:* |
cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:* |
Vendors & Products |
Mozilla firefox Esr
|
MITRE
Status: PUBLISHED
Assigner: mozilla
Published: 2015-08-29T19:00:00
Updated: 2024-08-06T06:18:11.986Z
Reserved: 2015-06-10T00:00:00
Link: CVE-2015-4498
Vulnrichment
No data.
NVD
Status : Modified
Published: 2015-08-29T19:59:01.827
Modified: 2024-11-21T02:31:12.593
Link: CVE-2015-4498
Redhat