Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rvjm-626r-4298

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Buffer overflow in an unspecified string class in the WebGL shader implementation in Mozilla Firefox 4.x through 5, Thunderbird before 6, SeaMonkey 2.x before 2.3, and possibly other products allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a long source-code block for a shader.

Buffer overflow in an unspecified string class in the WebGL shader implementation in Mozilla Firefox 4.x through 5, Thunderbird before 6, SeaMonkey 2.x before 2.3, and possibly other products allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a long source-code block for a shader.

EPSS

Процентиль: 89%
0.04825
Низкий

Дефекты

CWE-119

Связанные уязвимости

ubuntu
больше 14 лет назад

Buffer overflow in an unspecified string class in the WebGL shader implementation in Mozilla Firefox 4.x through 5, Thunderbird before 6, SeaMonkey 2.x before 2.3, and possibly other products allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a long source-code block for a shader.

nvd
больше 14 лет назад

Buffer overflow in an unspecified string class in the WebGL shader implementation in Mozilla Firefox 4.x through 5, Thunderbird before 6, SeaMonkey 2.x before 2.3, and possibly other products allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a long source-code block for a shader.

debian
больше 14 лет назад

Buffer overflow in an unspecified string class in the WebGL shader imp ...

EPSS

Процентиль: 89%
0.04825
Низкий

Дефекты

CWE-119