HackTesting
HomeArticlesTagsContact

CVE-2015-4495

The PDF reader in Mozilla Firefox before 39.0.3, Firefox ESR 38.x before 38.1.1, and Firefox OS before 2.2 allows remote attackers to bypass the Same Origin Policy, and read arbitrary files or gain privileges, via vectors involving crafted JavaScript code and a native setter, as exploited in the wild in August 2015.

References

https://bugzilla.mozilla.org/show_bug.cgi?id=1179262
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00010.html
http://www.securityfocus.com/bid/76249
https://www.exploit-db.com/exploits/37772/
http://rhn.redhat.com/errata/RHSA-2015-1581.html
https://security.gentoo.org/glsa/201512-10
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html
http://www.ubuntu.com/usn/USN-2707-1
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html
https://bugzilla.mozilla.org/show_bug.cgi?id=1178058
https://blog.mozilla.org/security/2015/08/06/firefox-exploit-found-in-the-wild/
http://www.mozilla.org/security/announce/2015/mfsa2015-78.html
http://www.securitytracker.com/id/1033216
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html
Published
Aug 8, 2015 00:00:00 UTC
Updated
Oct 21, 2025 23:55:58 UTC
Reserved
Jun 10, 2015 00:00:00 UTC
  • Home
  • Contact Us
  • Recently Updated CVEs
  • Articles
  • Tags
  • RSS Feed
  • Privacy Policy
© 2026 HackTesting. All rights reserved.