Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-ccgg-x9xx-x49v

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Use-after-free vulnerability in the WebRTC implementation in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, and SeaMonkey before 2.32 allows remote attackers to execute arbitrary code via crafted track data.

Use-after-free vulnerability in the WebRTC implementation in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, and SeaMonkey before 2.32 allows remote attackers to execute arbitrary code via crafted track data.

EPSS

Процентиль: 82%
0.01841
Низкий

Связанные уязвимости

ubuntu
больше 10 лет назад

Use-after-free vulnerability in the WebRTC implementation in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, and SeaMonkey before 2.32 allows remote attackers to execute arbitrary code via crafted track data.

redhat
больше 10 лет назад

Use-after-free vulnerability in the WebRTC implementation in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, and SeaMonkey before 2.32 allows remote attackers to execute arbitrary code via crafted track data.

nvd
больше 10 лет назад

Use-after-free vulnerability in the WebRTC implementation in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, and SeaMonkey before 2.32 allows remote attackers to execute arbitrary code via crafted track data.

debian
больше 10 лет назад

Use-after-free vulnerability in the WebRTC implementation in Mozilla F ...

oracle-oval
больше 10 лет назад

ELSA-2015-0046: firefox security and bug fix update (CRITICAL)

EPSS

Процентиль: 82%
0.01841
Низкий