Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-0812

Опубликовано: 01 апр. 2015
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.3

Описание

Mozilla Firefox before 37.0 does not require an HTTPS session for lightweight theme add-on installations, which allows man-in-the-middle attackers to bypass an intended user-confirmation requirement by deploying a crafted web site and conducting a DNS spoofing attack against a mozilla.org subdomain.

РелизСтатусПримечание
devel

released

37.0+build2-0ubuntu1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [37.0+build2-0ubuntu0.14.04.1]]
lucid

ignored

end of life
precise

released

37.0+build2-0ubuntu0.12.04.1
trusty

released

37.0+build2-0ubuntu0.14.04.1
trusty/esm

DNE

trusty was released [37.0+build2-0ubuntu0.14.04.1]
upstream

released

37.0
utopic

released

37.0+build2-0ubuntu0.14.10.1

Показывать по

EPSS

Процентиль: 39%
0.00169
Низкий

4.3 Medium

CVSS2

Связанные уязвимости

redhat
около 10 лет назад

Mozilla Firefox before 37.0 does not require an HTTPS session for lightweight theme add-on installations, which allows man-in-the-middle attackers to bypass an intended user-confirmation requirement by deploying a crafted web site and conducting a DNS spoofing attack against a mozilla.org subdomain.

nvd
около 10 лет назад

Mozilla Firefox before 37.0 does not require an HTTPS session for lightweight theme add-on installations, which allows man-in-the-middle attackers to bypass an intended user-confirmation requirement by deploying a crafted web site and conducting a DNS spoofing attack against a mozilla.org subdomain.

debian
около 10 лет назад

Mozilla Firefox before 37.0 does not require an HTTPS session for ligh ...

github
около 3 лет назад

Mozilla Firefox before 37.0 does not require an HTTPS session for lightweight theme add-on installations, which allows man-in-the-middle attackers to bypass an intended user-confirmation requirement by deploying a crafted web site and conducting a DNS spoofing attack against a mozilla.org subdomain.

fstec
около 10 лет назад

Уязвимость браузера Firefox, позволяющая удалённому злоумышленнику обойти ограничения безопасности

EPSS

Процентиль: 39%
0.00169
Низкий

4.3 Medium

CVSS2