Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-359f-mc8p-j8g3

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The nsXMLDocument::OnChannelRedirect function in Mozilla Firefox before 2.0.0.17, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allows remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code via unknown vectors.

The nsXMLDocument::OnChannelRedirect function in Mozilla Firefox before 2.0.0.17, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allows remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code via unknown vectors.

Ссылки

EPSS

Процентиль: 62%
0.00434
Низкий

Связанные уязвимости

ubuntu
почти 17 лет назад

The nsXMLDocument::OnChannelRedirect function in Mozilla Firefox before 2.0.0.17, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allows remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code via unknown vectors.

redhat
почти 17 лет назад

The nsXMLDocument::OnChannelRedirect function in Mozilla Firefox before 2.0.0.17, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allows remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code via unknown vectors.

nvd
почти 17 лет назад

The nsXMLDocument::OnChannelRedirect function in Mozilla Firefox before 2.0.0.17, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allows remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code via unknown vectors.

debian
почти 17 лет назад

The nsXMLDocument::OnChannelRedirect function in Mozilla Firefox befor ...

oracle-oval
почти 17 лет назад

ELSA-2008-0908: thunderbird security update (MODERATE)

EPSS

Процентиль: 62%
0.00434
Низкий