Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-ccgg-x9xx-x49v

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Use-after-free vulnerability in the WebRTC implementation in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, and SeaMonkey before 2.32 allows remote attackers to execute arbitrary code via crafted track data.

Use-after-free vulnerability in the WebRTC implementation in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, and SeaMonkey before 2.32 allows remote attackers to execute arbitrary code via crafted track data.

EPSS

Процентиль: 82%
0.01841
Низкий

Связанные уязвимости

ubuntu
почти 11 лет назад

Use-after-free vulnerability in the WebRTC implementation in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, and SeaMonkey before 2.32 allows remote attackers to execute arbitrary code via crafted track data.

redhat
почти 11 лет назад

Use-after-free vulnerability in the WebRTC implementation in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, and SeaMonkey before 2.32 allows remote attackers to execute arbitrary code via crafted track data.

nvd
почти 11 лет назад

Use-after-free vulnerability in the WebRTC implementation in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, and SeaMonkey before 2.32 allows remote attackers to execute arbitrary code via crafted track data.

debian
почти 11 лет назад

Use-after-free vulnerability in the WebRTC implementation in Mozilla F ...

oracle-oval
почти 11 лет назад

ELSA-2015-0046: firefox security and bug fix update (CRITICAL)

EPSS

Процентиль: 82%
0.01841
Низкий