Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-fcrm-w52m-c99v

Опубликовано: 03 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Mozilla Firefox before 2.0.0.5, when run on Windows, allows remote attackers to bypass file type checks and possibly execute programs via a (1) file:/// or (2) resource: URI with a dangerous extension, followed by a NULL byte (%00) and a safer extension, which causes Firefox to treat the requested file differently than Windows would.

Mozilla Firefox before 2.0.0.5, when run on Windows, allows remote attackers to bypass file type checks and possibly execute programs via a (1) file:/// or (2) resource: URI with a dangerous extension, followed by a NULL byte (%00) and a safer extension, which causes Firefox to treat the requested file differently than Windows would.

EPSS

Процентиль: 82%
0.01765
Низкий

Связанные уязвимости

ubuntu
около 18 лет назад

Mozilla Firefox before 2.0.0.5, when run on Windows, allows remote attackers to bypass file type checks and possibly execute programs via a (1) file:/// or (2) resource: URI with a dangerous extension, followed by a NULL byte (%00) and a safer extension, which causes Firefox to treat the requested file differently than Windows would.

nvd
около 18 лет назад

Mozilla Firefox before 2.0.0.5, when run on Windows, allows remote attackers to bypass file type checks and possibly execute programs via a (1) file:/// or (2) resource: URI with a dangerous extension, followed by a NULL byte (%00) and a safer extension, which causes Firefox to treat the requested file differently than Windows would.

debian
около 18 лет назад

Mozilla Firefox before 2.0.0.5, when run on Windows, allows remote att ...

EPSS

Процентиль: 82%
0.01765
Низкий