CVE-2015-0812
01.04.2015, 10:59
Mozilla Firefox before 37.0 does not require an HTTPS session for lightweight theme add-on installations, which allows man-in-the-middle attackers to bypass an intended user-confirmation requirement by deploying a crafted web site and conducting a DNS spoofing attack against a mozilla.org subdomain.Enginsight
Vendor | Product | Version |
---|---|---|
mozilla | firefox | 36.0.4 |
opensuse | opensuse | 13.1 |
opensuse | opensuse | 13.2 |
canonical | ubuntu_linux | 12.04 |
canonical | ubuntu_linux | 14.04 |
canonical | ubuntu_linux | 14.10 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Common Weakness Enumeration
References