Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rc8w-53vr-5ppv

Опубликовано: 03 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Integer overflow in Mozilla Thunderbird before 1.5.0.10 and SeaMonkey before 1.0.8 allows remote attackers to trigger a buffer overflow and possibly execute arbitrary code via a text/enhanced or text/richtext e-mail message with an extremely long line.

Integer overflow in Mozilla Thunderbird before 1.5.0.10 and SeaMonkey before 1.0.8 allows remote attackers to trigger a buffer overflow and possibly execute arbitrary code via a text/enhanced or text/richtext e-mail message with an extremely long line.

EPSS

Процентиль: 87%
0.033
Низкий

Связанные уязвимости

ubuntu
больше 18 лет назад

Integer overflow in Mozilla Thunderbird before 1.5.0.10 and SeaMonkey before 1.0.8 allows remote attackers to trigger a buffer overflow and possibly execute arbitrary code via a text/enhanced or text/richtext e-mail message with an extremely long line.

redhat
больше 18 лет назад

Integer overflow in Mozilla Thunderbird before 1.5.0.10 and SeaMonkey before 1.0.8 allows remote attackers to trigger a buffer overflow and possibly execute arbitrary code via a text/enhanced or text/richtext e-mail message with an extremely long line.

nvd
больше 18 лет назад

Integer overflow in Mozilla Thunderbird before 1.5.0.10 and SeaMonkey before 1.0.8 allows remote attackers to trigger a buffer overflow and possibly execute arbitrary code via a text/enhanced or text/richtext e-mail message with an extremely long line.

debian
больше 18 лет назад

Integer overflow in Mozilla Thunderbird before 1.5.0.10 and SeaMonkey ...

EPSS

Процентиль: 87%
0.033
Низкий