Show plain JSON{"id": "CVE-2015-0801", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2015-04-01T10:59:02.643", "references": [{"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html", "source": "security@mozilla.org"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00006.html", "source": "security@mozilla.org"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00012.html", "source": "security@mozilla.org"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html", "source": "security@mozilla.org"}, {"url": "http://rhn.redhat.com/errata/RHSA-2015-0766.html", "source": "security@mozilla.org"}, {"url": "http://rhn.redhat.com/errata/RHSA-2015-0771.html", "source": "security@mozilla.org"}, {"url": "http://www.debian.org/security/2015/dsa-3211", "source": "security@mozilla.org"}, {"url": "http://www.debian.org/security/2015/dsa-3212", "source": "security@mozilla.org"}, {"url": "http://www.mozilla.org/security/announce/2015/mfsa2015-40.html", "tags": ["Vendor Advisory"], "source": "security@mozilla.org"}, {"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", "source": "security@mozilla.org"}, {"url": "http://www.securityfocus.com/bid/73455", "source": "security@mozilla.org"}, {"url": "http://www.securitytracker.com/id/1031996", "source": "security@mozilla.org"}, {"url": "http://www.securitytracker.com/id/1032000", "source": "security@mozilla.org"}, {"url": "http://www.ubuntu.com/usn/USN-2550-1", "source": "security@mozilla.org"}, {"url": "http://www.ubuntu.com/usn/USN-2552-1", "source": "security@mozilla.org"}, {"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1146339", "source": "security@mozilla.org"}, {"url": "https://security.gentoo.org/glsa/201512-10", "source": "security@mozilla.org"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00006.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00012.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://rhn.redhat.com/errata/RHSA-2015-0766.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://rhn.redhat.com/errata/RHSA-2015-0771.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.debian.org/security/2015/dsa-3211", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.debian.org/security/2015/dsa-3212", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.mozilla.org/security/announce/2015/mfsa2015-40.html", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/73455", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securitytracker.com/id/1031996", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securitytracker.com/id/1032000", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.ubuntu.com/usn/USN-2550-1", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.ubuntu.com/usn/USN-2552-1", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1146339", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://security.gentoo.org/glsa/201512-10", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-264"}]}], "descriptions": [{"lang": "en", "value": "Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 allow remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code with chrome privileges via vectors involving anchor navigation, a similar issue to CVE-2015-0818."}, {"lang": "es", "value": "Mozilla Firefox anterior a 37.0, Firefox ESR 31.x anterior a 31.6, y Thunderbird anterior a 31.6 permiten a atacantes remotos evadir Same Origin Policy y ejecutar c\u00f3digo JavaScript arbitrario con privilegios chrome a trav\u00e9s de vectores que involucran la navegaci\u00f3n de anclajes (anchor), un problema similar a CVE-2015-0818."}], "lastModified": "2025-04-12T10:46:40.837", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4E600CCE-7BA3-410C-B089-9C7C27EE7D82", "versionEndIncluding": "36.0.4"}, {"criteria": "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C11F024A-A8B7-405B-8A13-4BF406FBDB22"}, {"criteria": "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D81A3698-797C-4CD9-BB02-A9182E0A6E11"}, {"criteria": "cpe:2.3:a:mozilla:firefox:31.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "84E8D7C7-B578-4623-9EA2-D13965DBE1F3"}, {"criteria": "cpe:2.3:a:mozilla:firefox:31.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C3E5D043-71F8-4A61-BEA4-176153E26FD6"}, {"criteria": "cpe:2.3:a:mozilla:firefox:31.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "51CBE0A9-1D05-4F88-B5B5-1592D4A4687E"}, {"criteria": "cpe:2.3:a:mozilla:firefox:31.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "902BF23B-C1B9-41F2-BF5D-C1722C3DBFFD"}, {"criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FDEF9754-B549-4AAC-926B-404143EA27FF", "versionEndIncluding": "31.5.3"}, {"criteria": "cpe:2.3:a:mozilla:firefox_esr:31.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6D7AAC77-57A3-4747-B760-0EE3CD53E4DE"}, {"criteria": "cpe:2.3:a:mozilla:firefox_esr:31.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7DCA6959-24B7-4F86-BE25-0A8A7C1A3D13"}, {"criteria": "cpe:2.3:a:mozilla:firefox_esr:31.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "697EA344-F982-4E9F-9EC8-CCCB5829582B"}, {"criteria": "cpe:2.3:a:mozilla:firefox_esr:31.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "61304847-1DC8-442C-8194-28E52B3C1293"}, {"criteria": "cpe:2.3:a:mozilla:firefox_esr:31.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8DF9724E-93B2-4BC7-8181-6D9521A6CC37"}, {"criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FC3823E9-1BAA-4402-95E2-7AF5B793DEBE", "versionEndIncluding": "31.5"}], "operator": "OR"}]}], "sourceIdentifier": "security@mozilla.org"}