Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-359f-mc8p-j8g3

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The nsXMLDocument::OnChannelRedirect function in Mozilla Firefox before 2.0.0.17, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allows remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code via unknown vectors.

The nsXMLDocument::OnChannelRedirect function in Mozilla Firefox before 2.0.0.17, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allows remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code via unknown vectors.

Ссылки

EPSS

Процентиль: 35%
0.00141
Низкий

Связанные уязвимости

ubuntu
около 17 лет назад

The nsXMLDocument::OnChannelRedirect function in Mozilla Firefox before 2.0.0.17, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allows remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code via unknown vectors.

redhat
около 17 лет назад

The nsXMLDocument::OnChannelRedirect function in Mozilla Firefox before 2.0.0.17, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allows remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code via unknown vectors.

nvd
около 17 лет назад

The nsXMLDocument::OnChannelRedirect function in Mozilla Firefox before 2.0.0.17, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allows remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code via unknown vectors.

debian
около 17 лет назад

The nsXMLDocument::OnChannelRedirect function in Mozilla Firefox befor ...

oracle-oval
около 17 лет назад

ELSA-2008-0908: thunderbird security update (MODERATE)

EPSS

Процентиль: 35%
0.00141
Низкий