Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wq8g-8jvq-gv63

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Stack-based buffer overflow in the mozilla::FileBlockCache::Read function in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to execute arbitrary code via crafted media content.

Stack-based buffer overflow in the mozilla::FileBlockCache::Read function in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to execute arbitrary code via crafted media content.

EPSS

Процентиль: 83%
0.0211
Низкий

Дефекты

CWE-119

Связанные уязвимости

ubuntu
больше 10 лет назад

Stack-based buffer overflow in the mozilla::FileBlockCache::Read function in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to execute arbitrary code via crafted media content.

redhat
больше 10 лет назад

Stack-based buffer overflow in the mozilla::FileBlockCache::Read function in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to execute arbitrary code via crafted media content.

nvd
больше 10 лет назад

Stack-based buffer overflow in the mozilla::FileBlockCache::Read function in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to execute arbitrary code via crafted media content.

debian
больше 10 лет назад

Stack-based buffer overflow in the mozilla::FileBlockCache::Read funct ...

oracle-oval
больше 10 лет назад

ELSA-2014-1924: thunderbird security update (IMPORTANT)

EPSS

Процентиль: 83%
0.0211
Низкий

Дефекты

CWE-119