Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2010-1215

Опубликовано: 20 июл. 2010
Источник: redhat
CVSS2: 6.8
EPSS Низкий

Описание

Mozilla Firefox 3.6.x before 3.6.7 and Thunderbird 3.1.x before 3.1.1 do not properly implement access to a content object through a SafeJSObjectWrapper (aka SJOW) wrapper, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges by leveraging "access to an object from the chrome scope."

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6firefoxNot affected
Red Hat Enterprise Linux 4firefoxFixedRHSA-2010:054721.07.2010
Red Hat Enterprise Linux 5firefoxFixedRHSA-2010:054721.07.2010
Red Hat Enterprise Linux 5xulrunnerFixedRHSA-2010:054721.07.2010

Показывать по

Дополнительная информация

Статус:

Critical
https://bugzilla.redhat.com/show_bug.cgi?id=615463Mozilla Arbitrary code execution using SJOW and fast native function

EPSS

Процентиль: 64%
0.00484
Низкий

6.8 Medium

CVSS2

Связанные уязвимости

ubuntu
почти 15 лет назад

Mozilla Firefox 3.6.x before 3.6.7 and Thunderbird 3.1.x before 3.1.1 do not properly implement access to a content object through a SafeJSObjectWrapper (aka SJOW) wrapper, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges by leveraging "access to an object from the chrome scope."

nvd
почти 15 лет назад

Mozilla Firefox 3.6.x before 3.6.7 and Thunderbird 3.1.x before 3.1.1 do not properly implement access to a content object through a SafeJSObjectWrapper (aka SJOW) wrapper, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges by leveraging "access to an object from the chrome scope."

debian
почти 15 лет назад

Mozilla Firefox 3.6.x before 3.6.7 and Thunderbird 3.1.x before 3.1.1 ...

github
около 3 лет назад

Mozilla Firefox 3.6.x before 3.6.7 and Thunderbird 3.1.x before 3.1.1 do not properly implement access to a content object through a SafeJSObjectWrapper (aka SJOW) wrapper, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges by leveraging "access to an object from the chrome scope."

oracle-oval
почти 15 лет назад

ELSA-2010-0547: firefox security update (CRITICAL)

EPSS

Процентиль: 64%
0.00484
Низкий

6.8 Medium

CVSS2