Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7x5c-m92f-jxjp

Опубликовано: 03 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code via script that changes the standard Object() constructor to return a reference to a privileged object and calling "named JavaScript functions" that use the constructor.

Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code via script that changes the standard Object() constructor to return a reference to a privileged object and calling "named JavaScript functions" that use the constructor.

Ссылки

EPSS

Процентиль: 96%
0.2749
Средний

Связанные уязвимости

ubuntu
около 19 лет назад

Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code via script that changes the standard Object() constructor to return a reference to a privileged object and calling "named JavaScript functions" that use the constructor.

redhat
около 19 лет назад

Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code via script that changes the standard Object() constructor to return a reference to a privileged object and calling "named JavaScript functions" that use the constructor.

nvd
около 19 лет назад

Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code via script that changes the standard Object() constructor to return a reference to a privileged object and calling "named JavaScript functions" that use the constructor.

debian
около 19 лет назад

Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMon ...

EPSS

Процентиль: 96%
0.2749
Средний