Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-h25j-67c9-vc8j

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The CSS parser in Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 ignores the '\0' escaped null character, which might allow remote attackers to bypass protection mechanisms such as sanitization routines.

The CSS parser in Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 ignores the '\0' escaped null character, which might allow remote attackers to bypass protection mechanisms such as sanitization routines.

EPSS

Процентиль: 77%
0.01132
Низкий

Связанные уязвимости

ubuntu
больше 16 лет назад

The CSS parser in Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 ignores the '\0' escaped null character, which might allow remote attackers to bypass protection mechanisms such as sanitization routines.

redhat
больше 16 лет назад

The CSS parser in Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 ignores the '\0' escaped null character, which might allow remote attackers to bypass protection mechanisms such as sanitization routines.

nvd
больше 16 лет назад

The CSS parser in Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 ignores the '\0' escaped null character, which might allow remote attackers to bypass protection mechanisms such as sanitization routines.

debian
больше 16 лет назад

The CSS parser in Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0. ...

oracle-oval
больше 16 лет назад

ELSA-2008-1036: firefox security update (CRITICAL)

EPSS

Процентиль: 77%
0.01132
Низкий