Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-5455

Опубликовано: 11 июн. 2018
Источник: debian
EPSS Низкий

Описание

The internal feed reader APIs that crossed the sandbox barrier allowed for a sandbox escape and escalation of privilege if combined with another vulnerability that resulted in remote code execution inside the sandboxed process. This vulnerability affects Firefox ESR < 52.1 and Firefox < 53.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
firefoxfixed52.0.1-1package

EPSS

Процентиль: 84%
0.02349
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 7 лет назад

The internal feed reader APIs that crossed the sandbox barrier allowed for a sandbox escape and escalation of privilege if combined with another vulnerability that resulted in remote code execution inside the sandboxed process. This vulnerability affects Firefox ESR < 52.1 and Firefox < 53.

CVSS3: 7.5
redhat
больше 8 лет назад

The internal feed reader APIs that crossed the sandbox barrier allowed for a sandbox escape and escalation of privilege if combined with another vulnerability that resulted in remote code execution inside the sandboxed process. This vulnerability affects Firefox ESR < 52.1 and Firefox < 53.

CVSS3: 7.5
nvd
около 7 лет назад

The internal feed reader APIs that crossed the sandbox barrier allowed for a sandbox escape and escalation of privilege if combined with another vulnerability that resulted in remote code execution inside the sandboxed process. This vulnerability affects Firefox ESR < 52.1 and Firefox < 53.

CVSS3: 7.5
github
около 3 лет назад

The internal feed reader APIs that crossed the sandbox barrier allowed for a sandbox escape and escalation of privilege if combined with another vulnerability that resulted in remote code execution inside the sandboxed process. This vulnerability affects Firefox ESR < 52.1 and Firefox < 53.

oracle-oval
больше 8 лет назад

ELSA-2017-1106: firefox security update (CRITICAL)

EPSS

Процентиль: 84%
0.02349
Низкий