Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-8641

Опубликовано: 14 янв. 2015
Источник: debian
EPSS Низкий

Описание

Use-after-free vulnerability in the WebRTC implementation in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, and SeaMonkey before 2.32 allows remote attackers to execute arbitrary code via crafted track data.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
iceweaselfixed31.4.0esr-1package
iceweaselend-of-lifesqueezepackage

Примечания

  • http://www.mozilla.org/security/announce/2015/mfsa2015-06.html

EPSS

Процентиль: 82%
0.01841
Низкий

Связанные уязвимости

ubuntu
больше 10 лет назад

Use-after-free vulnerability in the WebRTC implementation in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, and SeaMonkey before 2.32 allows remote attackers to execute arbitrary code via crafted track data.

redhat
больше 10 лет назад

Use-after-free vulnerability in the WebRTC implementation in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, and SeaMonkey before 2.32 allows remote attackers to execute arbitrary code via crafted track data.

nvd
больше 10 лет назад

Use-after-free vulnerability in the WebRTC implementation in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, and SeaMonkey before 2.32 allows remote attackers to execute arbitrary code via crafted track data.

github
больше 3 лет назад

Use-after-free vulnerability in the WebRTC implementation in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, and SeaMonkey before 2.32 allows remote attackers to execute arbitrary code via crafted track data.

oracle-oval
больше 10 лет назад

ELSA-2015-0046: firefox security and bug fix update (CRITICAL)

EPSS

Процентиль: 82%
0.01841
Низкий