Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2010-0179

Опубликовано: 30 мар. 2010
Источник: redhat
CVSS2: 5.1
EPSS Низкий

Описание

Mozilla Firefox before 3.0.19 and 3.5.x before 3.5.8, and SeaMonkey before 2.0.3, when the XMLHttpRequestSpy module in the Firebug add-on is used, does not properly handle interaction between the XMLHttpRequestSpy object and chrome privileged objects, which allows remote attackers to execute arbitrary JavaScript via a crafted HTTP response.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6firefoxNot affected
Red Hat Enterprise Linux 4firefoxFixedRHSA-2010:033230.03.2010
Red Hat Enterprise Linux 5firefoxFixedRHSA-2010:033230.03.2010
Red Hat Enterprise Linux 5xulrunnerFixedRHSA-2010:033230.03.2010

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=578155Firefox Arbitrary code execution with Firebug XMLHttpRequestSpy

EPSS

Процентиль: 72%
0.00725
Низкий

5.1 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 15 лет назад

Mozilla Firefox before 3.0.19 and 3.5.x before 3.5.8, and SeaMonkey before 2.0.3, when the XMLHttpRequestSpy module in the Firebug add-on is used, does not properly handle interaction between the XMLHttpRequestSpy object and chrome privileged objects, which allows remote attackers to execute arbitrary JavaScript via a crafted HTTP response.

nvd
больше 15 лет назад

Mozilla Firefox before 3.0.19 and 3.5.x before 3.5.8, and SeaMonkey before 2.0.3, when the XMLHttpRequestSpy module in the Firebug add-on is used, does not properly handle interaction between the XMLHttpRequestSpy object and chrome privileged objects, which allows remote attackers to execute arbitrary JavaScript via a crafted HTTP response.

debian
больше 15 лет назад

Mozilla Firefox before 3.0.19 and 3.5.x before 3.5.8, and SeaMonkey be ...

github
больше 3 лет назад

Mozilla Firefox before 3.0.19 and 3.5.x before 3.5.8, and SeaMonkey before 2.0.3, when the XMLHttpRequestSpy module in the Firebug add-on is used, does not properly handle interaction between the XMLHttpRequestSpy object and chrome privileged objects, which allows remote attackers to execute arbitrary JavaScript via a crafted HTTP response.

oracle-oval
больше 15 лет назад

ELSA-2010-0332: firefox security update (CRITICAL)

EPSS

Процентиль: 72%
0.00725
Низкий

5.1 Medium

CVSS2