Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mvwq-v22m-89qj

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Use-after-free vulnerability in the nsXULCommandDispatcher function in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to execute arbitrary code via a crafted XUL document that dequeues the current command updater.

Use-after-free vulnerability in the nsXULCommandDispatcher function in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to execute arbitrary code via a crafted XUL document that dequeues the current command updater.

EPSS

Процентиль: 84%
0.02451
Низкий

Связанные уязвимости

ubuntu
почти 14 лет назад

Use-after-free vulnerability in the nsXULCommandDispatcher function in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to execute arbitrary code via a crafted XUL document that dequeues the current command updater.

redhat
около 14 лет назад

Use-after-free vulnerability in the nsXULCommandDispatcher function in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to execute arbitrary code via a crafted XUL document that dequeues the current command updater.

nvd
почти 14 лет назад

Use-after-free vulnerability in the nsXULCommandDispatcher function in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to execute arbitrary code via a crafted XUL document that dequeues the current command updater.

debian
почти 14 лет назад

Use-after-free vulnerability in the nsXULCommandDispatcher function in ...

oracle-oval
около 14 лет назад

ELSA-2011-0886: thunderbird security update (CRITICAL)

EPSS

Процентиль: 84%
0.02451
Низкий