Search for vulnerabilities
Vulnerability details: VCID-w2n7-49dv-6ba3
Vulnerability ID VCID-w2n7-49dv-6ba3
Aliases CVE-2015-7188
Summary Security researcher Michał Bentkowski reported that adding white-space characters to hostnames that are IP addresses can bypass same-origin policy. This flaw was caused by trailing whitespaces being evaluated differently when parsing IP addresses instead of alphanumeric hostnames. This could lead to a cross-site script (XSS) attack. In general this flaw cannot be exploited through email in the Thunderbird product because scripting is disabled, but is potentially a risk in browser or browser-like contexts.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
epss 0.0123 https://api.first.org/data/v1/epss?cve=CVE-2015-7188
epss 0.0123 https://api.first.org/data/v1/epss?cve=CVE-2015-7188
epss 0.0123 https://api.first.org/data/v1/epss?cve=CVE-2015-7188
epss 0.0123 https://api.first.org/data/v1/epss?cve=CVE-2015-7188
epss 0.0123 https://api.first.org/data/v1/epss?cve=CVE-2015-7188
epss 0.0123 https://api.first.org/data/v1/epss?cve=CVE-2015-7188
epss 0.0123 https://api.first.org/data/v1/epss?cve=CVE-2015-7188
epss 0.0123 https://api.first.org/data/v1/epss?cve=CVE-2015-7188
epss 0.0123 https://api.first.org/data/v1/epss?cve=CVE-2015-7188
epss 0.0123 https://api.first.org/data/v1/epss?cve=CVE-2015-7188
epss 0.0123 https://api.first.org/data/v1/epss?cve=CVE-2015-7188
epss 0.0123 https://api.first.org/data/v1/epss?cve=CVE-2015-7188
epss 0.0123 https://api.first.org/data/v1/epss?cve=CVE-2015-7188
epss 0.0123 https://api.first.org/data/v1/epss?cve=CVE-2015-7188
epss 0.0123 https://api.first.org/data/v1/epss?cve=CVE-2015-7188
epss 0.0123 https://api.first.org/data/v1/epss?cve=CVE-2015-7188
epss 0.0123 https://api.first.org/data/v1/epss?cve=CVE-2015-7188
epss 0.0123 https://api.first.org/data/v1/epss?cve=CVE-2015-7188
epss 0.0123 https://api.first.org/data/v1/epss?cve=CVE-2015-7188
epss 0.0123 https://api.first.org/data/v1/epss?cve=CVE-2015-7188
epss 0.0123 https://api.first.org/data/v1/epss?cve=CVE-2015-7188
epss 0.0123 https://api.first.org/data/v1/epss?cve=CVE-2015-7188
epss 0.0123 https://api.first.org/data/v1/epss?cve=CVE-2015-7188
epss 0.0123 https://api.first.org/data/v1/epss?cve=CVE-2015-7188
generic_textual high https://www.mozilla.org/en-US/security/advisories/mfsa2015-122
No exploits are available.
Exploit Prediction Scoring System (EPSS)
Percentile 0.78321
EPSS Score 0.0123
Published At Aug. 6, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:10:53.673414+00:00 Mozilla Importer Import https://github.com/mozilla/foundation-security-advisories/blob/master/announce/2015/mfsa2015-122.md 37.0.0