Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wq8g-8jvq-gv63

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Stack-based buffer overflow in the mozilla::FileBlockCache::Read function in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to execute arbitrary code via crafted media content.

Stack-based buffer overflow in the mozilla::FileBlockCache::Read function in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to execute arbitrary code via crafted media content.

EPSS

Процентиль: 84%
0.0211
Низкий

Дефекты

CWE-119

Связанные уязвимости

ubuntu
почти 11 лет назад

Stack-based buffer overflow in the mozilla::FileBlockCache::Read function in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to execute arbitrary code via crafted media content.

redhat
почти 11 лет назад

Stack-based buffer overflow in the mozilla::FileBlockCache::Read function in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to execute arbitrary code via crafted media content.

nvd
почти 11 лет назад

Stack-based buffer overflow in the mozilla::FileBlockCache::Read function in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to execute arbitrary code via crafted media content.

debian
почти 11 лет назад

Stack-based buffer overflow in the mozilla::FileBlockCache::Read funct ...

oracle-oval
почти 11 лет назад

ELSA-2014-1924: thunderbird security update (IMPORTANT)

EPSS

Процентиль: 84%
0.0211
Низкий

Дефекты

CWE-119