Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-j27m-p5vq-3f4g

Опубликовано: 03 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Use-after-free vulnerability in Mozilla Firefox before 3.5.19 and 3.6.x before 3.6.17, and SeaMonkey before 2.0.14, allows remote attackers to execute arbitrary code via vectors related to OBJECT's mChannel.

Use-after-free vulnerability in Mozilla Firefox before 3.5.19 and 3.6.x before 3.6.17, and SeaMonkey before 2.0.14, allows remote attackers to execute arbitrary code via vectors related to OBJECT's mChannel.

EPSS

Процентиль: 99%
0.83259
Высокий

Связанные уязвимости

ubuntu
около 14 лет назад

Use-after-free vulnerability in Mozilla Firefox before 3.5.19 and 3.6.x before 3.6.17, and SeaMonkey before 2.0.14, allows remote attackers to execute arbitrary code via vectors related to OBJECT's mChannel.

redhat
около 14 лет назад

Use-after-free vulnerability in Mozilla Firefox before 3.5.19 and 3.6.x before 3.6.17, and SeaMonkey before 2.0.14, allows remote attackers to execute arbitrary code via vectors related to OBJECT's mChannel.

nvd
около 14 лет назад

Use-after-free vulnerability in Mozilla Firefox before 3.5.19 and 3.6.x before 3.6.17, and SeaMonkey before 2.0.14, allows remote attackers to execute arbitrary code via vectors related to OBJECT's mChannel.

debian
около 14 лет назад

Use-after-free vulnerability in Mozilla Firefox before 3.5.19 and 3.6. ...

oracle-oval
около 14 лет назад

ELSA-2011-0471: firefox security update (CRITICAL)

EPSS

Процентиль: 99%
0.83259
Высокий