Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-34481

Опубликовано: 22 дек. 2022
Источник: debian
EPSS Низкий

Описание

In the <code>nsTArray_Impl::ReplaceElementsAt()</code> function, an integer overflow could have occurred when the number of elements to replace was too large for the container. This vulnerability affects Firefox < 102, Firefox ESR < 91.11, Thunderbird < 102, and Thunderbird < 91.11.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
firefoxfixed102.0-1package
firefox-esrfixed91.11.0esr-1package
thunderbirdfixed1:91.11.0-1package

Примечания

  • https://www.mozilla.org/en-US/security/advisories/mfsa2022-24/#CVE-2022-34481

  • https://www.mozilla.org/en-US/security/advisories/mfsa2022-25/#CVE-2022-34481

  • https://www.mozilla.org/en-US/security/advisories/mfsa2022-26/#CVE-2022-34481

EPSS

Процентиль: 41%
0.00187
Низкий

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 2 лет назад

In the <code>nsTArray_Impl::ReplaceElementsAt()</code> function, an integer overflow could have occurred when the number of elements to replace was too large for the container. This vulnerability affects Firefox < 102, Firefox ESR < 91.11, Thunderbird < 102, and Thunderbird < 91.11.

CVSS3: 8.8
redhat
почти 3 года назад

In the <code>nsTArray_Impl::ReplaceElementsAt()</code> function, an integer overflow could have occurred when the number of elements to replace was too large for the container. This vulnerability affects Firefox < 102, Firefox ESR < 91.11, Thunderbird < 102, and Thunderbird < 91.11.

CVSS3: 8.8
nvd
больше 2 лет назад

In the <code>nsTArray_Impl::ReplaceElementsAt()</code> function, an integer overflow could have occurred when the number of elements to replace was too large for the container. This vulnerability affects Firefox < 102, Firefox ESR < 91.11, Thunderbird < 102, and Thunderbird < 91.11.

CVSS3: 8.8
github
больше 2 лет назад

In the <code>nsTArray_Impl::ReplaceElementsAt()</code> function, an integer overflow could have occurred when the number of elements to replace was too large for the container. This vulnerability affects Firefox < 102, Firefox ESR < 91.11, Thunderbird < 102, and Thunderbird < 91.11.

CVSS3: 6.1
fstec
почти 3 года назад

Уязвимость функции nsTArray_Impl::ReplaceElementsAt() почтового клиента Thunderbird, браузеров Firefox и Firefox ESR, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 41%
0.00187
Низкий