Search for vulnerabilities
Vulnerability details: VCID-e9km-d4gr-9yds
Vulnerability ID VCID-e9km-d4gr-9yds
Aliases CVE-2014-8638
Summary Security researcher Muneaki Nishimura reported that navigator.sendBeacon() does not follow the cross-origin resource sharing (CORS) specification. This results in the request from sendBeacon() lacking an origin header in violation of the W3C Beacon specification and not being treated as a CORS request. This allows for a potential Cross-site request forgery (XSRF) attack from malicious websites. In general this flaw cannot be exploited through email in the Thunderbird product because scripting is disabled, but is potentially a risk in browser or browser-like contexts.
Status Published
Exploitability 0.5
Weighted Severity 0.0
Risk None
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
epss 0.00181 https://api.first.org/data/v1/epss?cve=CVE-2014-8638
epss 0.00181 https://api.first.org/data/v1/epss?cve=CVE-2014-8638
epss 0.00181 https://api.first.org/data/v1/epss?cve=CVE-2014-8638
epss 0.00181 https://api.first.org/data/v1/epss?cve=CVE-2014-8638
epss 0.00181 https://api.first.org/data/v1/epss?cve=CVE-2014-8638
epss 0.00181 https://api.first.org/data/v1/epss?cve=CVE-2014-8638
epss 0.00181 https://api.first.org/data/v1/epss?cve=CVE-2014-8638
epss 0.00181 https://api.first.org/data/v1/epss?cve=CVE-2014-8638
epss 0.00181 https://api.first.org/data/v1/epss?cve=CVE-2014-8638
epss 0.00181 https://api.first.org/data/v1/epss?cve=CVE-2014-8638
epss 0.00181 https://api.first.org/data/v1/epss?cve=CVE-2014-8638
epss 0.00181 https://api.first.org/data/v1/epss?cve=CVE-2014-8638
epss 0.00181 https://api.first.org/data/v1/epss?cve=CVE-2014-8638
epss 0.00181 https://api.first.org/data/v1/epss?cve=CVE-2014-8638
epss 0.00181 https://api.first.org/data/v1/epss?cve=CVE-2014-8638
epss 0.00181 https://api.first.org/data/v1/epss?cve=CVE-2014-8638
epss 0.00181 https://api.first.org/data/v1/epss?cve=CVE-2014-8638
epss 0.00181 https://api.first.org/data/v1/epss?cve=CVE-2014-8638
epss 0.00181 https://api.first.org/data/v1/epss?cve=CVE-2014-8638
epss 0.00181 https://api.first.org/data/v1/epss?cve=CVE-2014-8638
epss 0.00181 https://api.first.org/data/v1/epss?cve=CVE-2014-8638
epss 0.00181 https://api.first.org/data/v1/epss?cve=CVE-2014-8638
epss 0.00181 https://api.first.org/data/v1/epss?cve=CVE-2014-8638
epss 0.00181 https://api.first.org/data/v1/epss?cve=CVE-2014-8638
epss 0.00181 https://api.first.org/data/v1/epss?cve=CVE-2014-8638
epss 0.00181 https://api.first.org/data/v1/epss?cve=CVE-2014-8638
epss 0.00181 https://api.first.org/data/v1/epss?cve=CVE-2014-8638
epss 0.00181 https://api.first.org/data/v1/epss?cve=CVE-2014-8638
epss 0.00181 https://api.first.org/data/v1/epss?cve=CVE-2014-8638
generic_textual none https://www.mozilla.org/en-US/security/advisories/mfsa2015-03
No exploits are available.
Exploit Prediction Scoring System (EPSS)
Percentile 0.40287
EPSS Score 0.00181
Published At July 30, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:10:55.426571+00:00 Mozilla Importer Import https://github.com/mozilla/foundation-security-advisories/blob/master/announce/2015/mfsa2015-03.md 37.0.0