Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2010-3767

Опубликовано: 10 дек. 2010
Источник: debian
EPSS Низкий

Описание

Integer overflow in the NewIdArray function in Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, and SeaMonkey before 2.0.11, allows remote attackers to execute arbitrary code via a JavaScript array with many elements.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
xulrunnerremovedpackage
iceweaselfixed3.5.16-1package
iceweaselnot-affectedlennypackage
iceapefixed2.0.11-1package
iceapenot-affectedlennypackage

Примечания

  • xulrunner in wheezy is not covered by security support

EPSS

Процентиль: 88%
0.0415
Низкий

Связанные уязвимости

ubuntu
больше 14 лет назад

Integer overflow in the NewIdArray function in Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, and SeaMonkey before 2.0.11, allows remote attackers to execute arbitrary code via a JavaScript array with many elements.

redhat
больше 14 лет назад

Integer overflow in the NewIdArray function in Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, and SeaMonkey before 2.0.11, allows remote attackers to execute arbitrary code via a JavaScript array with many elements.

nvd
больше 14 лет назад

Integer overflow in the NewIdArray function in Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, and SeaMonkey before 2.0.11, allows remote attackers to execute arbitrary code via a JavaScript array with many elements.

github
около 3 лет назад

Integer overflow in the NewIdArray function in Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, and SeaMonkey before 2.0.11, allows remote attackers to execute arbitrary code via a JavaScript array with many elements.

oracle-oval
больше 14 лет назад

ELSA-2010-0966: firefox security update (CRITICAL)

EPSS

Процентиль: 88%
0.0415
Низкий