Vulnerability Details : CVE-2015-0828

Double free vulnerability in the nsXMLHttpRequest::GetResponse function in Mozilla Firefox before 36.0, when a nonstandard memory allocator is used, allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via crafted JavaScript code that makes an XMLHttpRequest call with zero bytes of data.
Vulnerability category: Memory CorruptionExecute codeDenial of service
Published 2015-02-25 11:59:09
Updated 2018-10-30 16:27:36
View at NVD,

Exploit prediction scoring system (EPSS) score for CVE-2015-0828

Probability of exploitation activity in the next 30 days: 0.91%

Percentile, the proportion of vulnerabilities that are scored at or less: ~ 81 % EPSS Score History EPSS FAQ

CVSS scores for CVE-2015-0828

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Source
[email protected]

References for CVE-2015-0828

Products affected by CVE-2015-0828

This web site uses cookies for managing your session and website analytics (Google analytics) purposes as described in our privacy policy.
By using this web site you are agreeing to terms of use!