Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2g6x-7c5j-qpjf

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Use-after-free vulnerability in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14, when JavaScript is disabled, allows remote attackers to execute arbitrary code via a crafted XUL document.

Use-after-free vulnerability in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14, when JavaScript is disabled, allows remote attackers to execute arbitrary code via a crafted XUL document.

EPSS

Процентиль: 85%
0.02711
Низкий

Связанные уязвимости

ubuntu
почти 14 лет назад

Use-after-free vulnerability in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14, when JavaScript is disabled, allows remote attackers to execute arbitrary code via a crafted XUL document.

redhat
около 14 лет назад

Use-after-free vulnerability in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14, when JavaScript is disabled, allows remote attackers to execute arbitrary code via a crafted XUL document.

nvd
почти 14 лет назад

Use-after-free vulnerability in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14, when JavaScript is disabled, allows remote attackers to execute arbitrary code via a crafted XUL document.

debian
почти 14 лет назад

Use-after-free vulnerability in Mozilla Firefox before 3.6.18 and 4.x ...

oracle-oval
около 14 лет назад

ELSA-2011-0885: firefox security and bug fix update (CRITICAL)

EPSS

Процентиль: 85%
0.02711
Низкий