Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3mjg-gvfx-f783

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Mozilla Firefox before 1.5.0.1, Thunderbird 1.5 if running Javascript in mail, and SeaMonkey before 1.0 allow remote attackers to execute arbitrary code by changing an element's style from position:relative to position:static, which causes Gecko to operate on freed memory.

Mozilla Firefox before 1.5.0.1, Thunderbird 1.5 if running Javascript in mail, and SeaMonkey before 1.0 allow remote attackers to execute arbitrary code by changing an element's style from position:relative to position:static, which causes Gecko to operate on freed memory.

EPSS

Процентиль: 91%
0.07642
Низкий

Связанные уязвимости

ubuntu
больше 19 лет назад

Mozilla Firefox before 1.5.0.1, Thunderbird 1.5 if running Javascript in mail, and SeaMonkey before 1.0 allow remote attackers to execute arbitrary code by changing an element's style from position:relative to position:static, which causes Gecko to operate on freed memory.

nvd
больше 19 лет назад

Mozilla Firefox before 1.5.0.1, Thunderbird 1.5 if running Javascript in mail, and SeaMonkey before 1.0 allow remote attackers to execute arbitrary code by changing an element's style from position:relative to position:static, which causes Gecko to operate on freed memory.

debian
больше 19 лет назад

Mozilla Firefox before 1.5.0.1, Thunderbird 1.5 if running Javascript ...

EPSS

Процентиль: 91%
0.07642
Низкий