Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2008-0016

Опубликовано: 23 сент. 2008
Источник: redhat
EPSS Средний

Описание

Stack-based buffer overflow in the URL parsing implementation in Mozilla Firefox before 2.0.0.17 and SeaMonkey before 1.1.12 allows remote attackers to execute arbitrary code via a crafted UTF-8 URL in a link.

Дополнительная информация

Статус:

Critical
Дефект:
CWE-121
https://bugzilla.redhat.com/show_bug.cgi?id=463181Mozilla UTF-8 stack buffer overflow

EPSS

Процентиль: 98%
0.47313
Средний

Связанные уязвимости

ubuntu
больше 17 лет назад

Stack-based buffer overflow in the URL parsing implementation in Mozilla Firefox before 2.0.0.17 and SeaMonkey before 1.1.12 allows remote attackers to execute arbitrary code via a crafted UTF-8 URL in a link.

nvd
больше 17 лет назад

Stack-based buffer overflow in the URL parsing implementation in Mozilla Firefox before 2.0.0.17 and SeaMonkey before 1.1.12 allows remote attackers to execute arbitrary code via a crafted UTF-8 URL in a link.

debian
больше 17 лет назад

Stack-based buffer overflow in the URL parsing implementation in Mozil ...

github
почти 4 года назад

Stack-based buffer overflow in the URL parsing implementation in Mozilla Firefox before 2.0.0.17 and SeaMonkey before 1.1.12 allows remote attackers to execute arbitrary code via a crafted UTF-8 URL in a link.

oracle-oval
больше 17 лет назад

ELSA-2008-0908: thunderbird security update (MODERATE)

EPSS

Процентиль: 98%
0.47313
Средний