Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-636h-f5g9-p45x

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The js_dtoa function in Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, Thunderbird before 1.5.0.9, and SeaMonkey before 1.0.7 overwrites memory instead of exiting when the floating point precision is reduced, which allows remote attackers to cause a denial of service via any plugins that reduce the precision.

The js_dtoa function in Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, Thunderbird before 1.5.0.9, and SeaMonkey before 1.0.7 overwrites memory instead of exiting when the floating point precision is reduced, which allows remote attackers to cause a denial of service via any plugins that reduce the precision.

Ссылки

EPSS

Процентиль: 94%
0.13714
Средний

Дефекты

CWE-835

Связанные уязвимости

ubuntu
почти 19 лет назад

The js_dtoa function in Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, Thunderbird before 1.5.0.9, and SeaMonkey before 1.0.7 overwrites memory instead of exiting when the floating point precision is reduced, which allows remote attackers to cause a denial of service via any plugins that reduce the precision.

nvd
почти 19 лет назад

The js_dtoa function in Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, Thunderbird before 1.5.0.9, and SeaMonkey before 1.0.7 overwrites memory instead of exiting when the floating point precision is reduced, which allows remote attackers to cause a denial of service via any plugins that reduce the precision.

debian
почти 19 лет назад

The js_dtoa function in Mozilla Firefox 2.x before 2.0.0.1, 1.5.x befo ...

EPSS

Процентиль: 94%
0.13714
Средний

Дефекты

CWE-835