Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-15ft-jxfa-pkgc
Vulnerability ID VCID-15ft-jxfa-pkgc
Aliases CVE-2015-0800
Summary Mozilla developer Daniel Stenberg reported that the DNS resolver in Firefox for Android uses an insufficiently random algorithm when generating random numbers for the unique identifier. This was derived from an old version of the Bionic libc library and suffered from insufficient randomness in the pseudo-random number generator (PRNG) as described by Roee Hay and Roi Saltzman. This leaves Firefox on Android potentially vulnerable to DNS poisoning attacks because an attacker may be able to predict the identifier used, allowing for the spoofing of web sites and cookie theft. This flaw did not affect desktop versions of Mozilla products and only Firefox for Android was affected.
Status Published
Exploitability None
Weighted Severity None
Risk None
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
No exploits are available.
Exploit Prediction Scoring System (EPSS)
Percentile 0.63742
EPSS Score 0.00455
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T13:18:33.741078+00:00 Mozilla Importer Import https://github.com/mozilla/foundation-security-advisories/blob/master/announce/2015/mfsa2015-41.md 38.0.0