Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-vjx5-qhvw-79qj

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The nsTransformedTextRun::SetCapitalization function in Mozilla Firefox before 36.0 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read of heap memory) via a crafted Cascading Style Sheets (CSS) token sequence that triggers a restyle or reflow operation.

The nsTransformedTextRun::SetCapitalization function in Mozilla Firefox before 36.0 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read of heap memory) via a crafted Cascading Style Sheets (CSS) token sequence that triggers a restyle or reflow operation.

EPSS

Процентиль: 73%
0.00796
Низкий

Дефекты

CWE-119

Связанные уязвимости

ubuntu
больше 10 лет назад

The nsTransformedTextRun::SetCapitalization function in Mozilla Firefox before 36.0 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read of heap memory) via a crafted Cascading Style Sheets (CSS) token sequence that triggers a restyle or reflow operation.

redhat
больше 10 лет назад

The nsTransformedTextRun::SetCapitalization function in Mozilla Firefox before 36.0 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read of heap memory) via a crafted Cascading Style Sheets (CSS) token sequence that triggers a restyle or reflow operation.

nvd
больше 10 лет назад

The nsTransformedTextRun::SetCapitalization function in Mozilla Firefox before 36.0 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read of heap memory) via a crafted Cascading Style Sheets (CSS) token sequence that triggers a restyle or reflow operation.

debian
больше 10 лет назад

The nsTransformedTextRun::SetCapitalization function in Mozilla Firefo ...

EPSS

Процентиль: 73%
0.00796
Низкий

Дефекты

CWE-119