Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3j5j-x7ph-c2r8

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Heap-based buffer overflow in Mozilla Thunderbird before 2.0.0.12 and SeaMonkey before 1.1.8 might allow remote attackers to execute arbitrary code via a crafted external-body MIME type in an e-mail message, related to an incorrect memory allocation during message preview.

Heap-based buffer overflow in Mozilla Thunderbird before 2.0.0.12 and SeaMonkey before 1.1.8 might allow remote attackers to execute arbitrary code via a crafted external-body MIME type in an e-mail message, related to an incorrect memory allocation during message preview.

EPSS

Процентиль: 97%
0.33518
Средний

Дефекты

CWE-119

Связанные уязвимости

ubuntu
больше 17 лет назад

Heap-based buffer overflow in Mozilla Thunderbird before 2.0.0.12 and SeaMonkey before 1.1.8 might allow remote attackers to execute arbitrary code via a crafted external-body MIME type in an e-mail message, related to an incorrect memory allocation during message preview.

redhat
больше 17 лет назад

Heap-based buffer overflow in Mozilla Thunderbird before 2.0.0.12 and SeaMonkey before 1.1.8 might allow remote attackers to execute arbitrary code via a crafted external-body MIME type in an e-mail message, related to an incorrect memory allocation during message preview.

nvd
больше 17 лет назад

Heap-based buffer overflow in Mozilla Thunderbird before 2.0.0.12 and SeaMonkey before 1.1.8 might allow remote attackers to execute arbitrary code via a crafted external-body MIME type in an e-mail message, related to an incorrect memory allocation during message preview.

debian
больше 17 лет назад

Heap-based buffer overflow in Mozilla Thunderbird before 2.0.0.12 and ...

EPSS

Процентиль: 97%
0.33518
Средний

Дефекты

CWE-119