Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7683-prf8-wx5w

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Stack-based buffer overflow in the URL parsing implementation in Mozilla Firefox before 2.0.0.17 and SeaMonkey before 1.1.12 allows remote attackers to execute arbitrary code via a crafted UTF-8 URL in a link.

Stack-based buffer overflow in the URL parsing implementation in Mozilla Firefox before 2.0.0.17 and SeaMonkey before 1.1.12 allows remote attackers to execute arbitrary code via a crafted UTF-8 URL in a link.

Ссылки

EPSS

Процентиль: 97%
0.35536
Средний

Дефекты

CWE-119

Связанные уязвимости

ubuntu
больше 16 лет назад

Stack-based buffer overflow in the URL parsing implementation in Mozilla Firefox before 2.0.0.17 and SeaMonkey before 1.1.12 allows remote attackers to execute arbitrary code via a crafted UTF-8 URL in a link.

redhat
больше 16 лет назад

Stack-based buffer overflow in the URL parsing implementation in Mozilla Firefox before 2.0.0.17 and SeaMonkey before 1.1.12 allows remote attackers to execute arbitrary code via a crafted UTF-8 URL in a link.

nvd
больше 16 лет назад

Stack-based buffer overflow in the URL parsing implementation in Mozilla Firefox before 2.0.0.17 and SeaMonkey before 1.1.12 allows remote attackers to execute arbitrary code via a crafted UTF-8 URL in a link.

debian
больше 16 лет назад

Stack-based buffer overflow in the URL parsing implementation in Mozil ...

oracle-oval
больше 16 лет назад

ELSA-2008-0908: thunderbird security update (MODERATE)

EPSS

Процентиль: 97%
0.35536
Средний

Дефекты

CWE-119