Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jfx6-pmj2-6ffh

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The layout engine in Mozilla Firefox 3.x before 3.0.5, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allows remote attackers to cause a denial of service (crash) via vectors that trigger memory corruption, related to the GetXMLEntity and FastAppendChar functions.

The layout engine in Mozilla Firefox 3.x before 3.0.5, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allows remote attackers to cause a denial of service (crash) via vectors that trigger memory corruption, related to the GetXMLEntity and FastAppendChar functions.

EPSS

Процентиль: 88%
0.03767
Низкий

Связанные уязвимости

ubuntu
почти 17 лет назад

The layout engine in Mozilla Firefox 3.x before 3.0.5, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allows remote attackers to cause a denial of service (crash) via vectors that trigger memory corruption, related to the GetXMLEntity and FastAppendChar functions.

redhat
почти 17 лет назад

The layout engine in Mozilla Firefox 3.x before 3.0.5, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allows remote attackers to cause a denial of service (crash) via vectors that trigger memory corruption, related to the GetXMLEntity and FastAppendChar functions.

nvd
почти 17 лет назад

The layout engine in Mozilla Firefox 3.x before 3.0.5, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allows remote attackers to cause a denial of service (crash) via vectors that trigger memory corruption, related to the GetXMLEntity and FastAppendChar functions.

debian
почти 17 лет назад

The layout engine in Mozilla Firefox 3.x before 3.0.5, Thunderbird 2.x ...

oracle-oval
почти 17 лет назад

ELSA-2008-1036: firefox security update (CRITICAL)

EPSS

Процентиль: 88%
0.03767
Низкий