Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2007-1282

Опубликовано: 05 мар. 2007
Источник: redhat
EPSS Низкий

Описание

Integer overflow in Mozilla Thunderbird before 1.5.0.10 and SeaMonkey before 1.0.8 allows remote attackers to trigger a buffer overflow and possibly execute arbitrary code via a text/enhanced or text/richtext e-mail message with an extremely long line.

Дополнительная информация

Статус:

Critical

EPSS

Процентиль: 87%
0.033
Низкий

Связанные уязвимости

ubuntu
больше 18 лет назад

Integer overflow in Mozilla Thunderbird before 1.5.0.10 and SeaMonkey before 1.0.8 allows remote attackers to trigger a buffer overflow and possibly execute arbitrary code via a text/enhanced or text/richtext e-mail message with an extremely long line.

nvd
больше 18 лет назад

Integer overflow in Mozilla Thunderbird before 1.5.0.10 and SeaMonkey before 1.0.8 allows remote attackers to trigger a buffer overflow and possibly execute arbitrary code via a text/enhanced or text/richtext e-mail message with an extremely long line.

debian
больше 18 лет назад

Integer overflow in Mozilla Thunderbird before 1.5.0.10 and SeaMonkey ...

github
больше 3 лет назад

Integer overflow in Mozilla Thunderbird before 1.5.0.10 and SeaMonkey before 1.0.8 allows remote attackers to trigger a buffer overflow and possibly execute arbitrary code via a text/enhanced or text/richtext e-mail message with an extremely long line.

EPSS

Процентиль: 87%
0.033
Низкий