Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-0820

Опубликовано: 25 фев. 2015
Источник: debian
EPSS Низкий

Описание

Mozilla Firefox before 36.0 does not properly restrict transitions of JavaScript objects from a non-extensible state to an extensible state, which allows remote attackers to bypass a Caja Compiler sandbox protection mechanism or a Secure EcmaScript sandbox protection mechanism via a crafted web site.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
iceweaselnot-affectedpackage

Примечания

  • https://www.mozilla.org/en-US/security/advisories/mfsa2015-27/

EPSS

Процентиль: 56%
0.0034
Низкий

Связанные уязвимости

ubuntu
почти 11 лет назад

Mozilla Firefox before 36.0 does not properly restrict transitions of JavaScript objects from a non-extensible state to an extensible state, which allows remote attackers to bypass a Caja Compiler sandbox protection mechanism or a Secure EcmaScript sandbox protection mechanism via a crafted web site.

nvd
почти 11 лет назад

Mozilla Firefox before 36.0 does not properly restrict transitions of JavaScript objects from a non-extensible state to an extensible state, which allows remote attackers to bypass a Caja Compiler sandbox protection mechanism or a Secure EcmaScript sandbox protection mechanism via a crafted web site.

github
больше 3 лет назад

Mozilla Firefox before 36.0 does not properly restrict transitions of JavaScript objects from a non-extensible state to an extensible state, which allows remote attackers to bypass a Caja Compiler sandbox protection mechanism or a Secure EcmaScript sandbox protection mechanism via a crafted web site.

EPSS

Процентиль: 56%
0.0034
Низкий