Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-v78f-cp57-fcpm

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Heap-based buffer overflow in the nsTextFrameUtils::TransformText function in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 might allow remote attackers to execute arbitrary code via a bidirectional text run.

Heap-based buffer overflow in the nsTextFrameUtils::TransformText function in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 might allow remote attackers to execute arbitrary code via a bidirectional text run.

EPSS

Процентиль: 90%
0.05856
Низкий

Дефекты

CWE-119

Связанные уязвимости

ubuntu
почти 15 лет назад

Heap-based buffer overflow in the nsTextFrameUtils::TransformText function in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 might allow remote attackers to execute arbitrary code via a bidirectional text run.

redhat
почти 15 лет назад

Heap-based buffer overflow in the nsTextFrameUtils::TransformText function in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 might allow remote attackers to execute arbitrary code via a bidirectional text run.

nvd
почти 15 лет назад

Heap-based buffer overflow in the nsTextFrameUtils::TransformText function in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 might allow remote attackers to execute arbitrary code via a bidirectional text run.

debian
почти 15 лет назад

Heap-based buffer overflow in the nsTextFrameUtils::TransformText func ...

oracle-oval
почти 15 лет назад

ELSA-2010-0681: firefox security update (CRITICAL)

EPSS

Процентиль: 90%
0.05856
Низкий

Дефекты

CWE-119