Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-x653-3j24-7h2r

Опубликовано: 03 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving garbage collection that causes deletion of a temporary object that is still being used.

The Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving garbage collection that causes deletion of a temporary object that is still being used.

Ссылки

EPSS

Процентиль: 96%
0.23003
Средний

Связанные уязвимости

ubuntu
около 19 лет назад

The Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving garbage collection that causes deletion of a temporary object that is still being used.

redhat
около 19 лет назад

The Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving garbage collection that causes deletion of a temporary object that is still being used.

nvd
около 19 лет назад

The Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving garbage collection that causes deletion of a temporary object that is still being used.

debian
около 19 лет назад

The Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird b ...

EPSS

Процентиль: 96%
0.23003
Средний