Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2011-2983

Опубликовано: 16 авг. 2011
Источник: redhat
CVSS2: 6.8
EPSS Низкий

Описание

Mozilla Firefox before 3.6.20, Thunderbird 2.x and 3.x before 3.1.12, SeaMonkey 1.x and 2.x, and possibly other products does not properly handle the RegExp.input property, which allows remote attackers to bypass the Same Origin Policy and read data from a different domain via a crafted web site, possibly related to a use-after-free.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux Extended Update Support 5.7firefoxAffected
Red Hat Enterprise Linux Extended Update Support 5.7thunderbirdAffected
Red Hat Enterprise Linux Extended Update Support 6.1firefoxAffected
Red Hat Enterprise Linux 4firefoxFixedRHSA-2011:116416.08.2011
Red Hat Enterprise Linux 4thunderbirdFixedRHSA-2011:116516.08.2011
Red Hat Enterprise Linux 4seamonkeyFixedRHSA-2011:116716.08.2011
Red Hat Enterprise Linux 5firefoxFixedRHSA-2011:116416.08.2011
Red Hat Enterprise Linux 5xulrunnerFixedRHSA-2011:116416.08.2011
Red Hat Enterprise Linux 5thunderbirdFixedRHSA-2011:116516.08.2011
Red Hat Enterprise Linux 6firefoxFixedRHSA-2011:116416.08.2011

Показывать по

Дополнительная информация

Статус:

Critical
https://bugzilla.redhat.com/show_bug.cgi?id=730523Mozilla: Private data leakage using RegExp.input

EPSS

Процентиль: 74%
0.00849
Низкий

6.8 Medium

CVSS2

Связанные уязвимости

ubuntu
около 14 лет назад

Mozilla Firefox before 3.6.20, Thunderbird 2.x and 3.x before 3.1.12, SeaMonkey 1.x and 2.x, and possibly other products does not properly handle the RegExp.input property, which allows remote attackers to bypass the Same Origin Policy and read data from a different domain via a crafted web site, possibly related to a use-after-free.

nvd
около 14 лет назад

Mozilla Firefox before 3.6.20, Thunderbird 2.x and 3.x before 3.1.12, SeaMonkey 1.x and 2.x, and possibly other products does not properly handle the RegExp.input property, which allows remote attackers to bypass the Same Origin Policy and read data from a different domain via a crafted web site, possibly related to a use-after-free.

debian
около 14 лет назад

Mozilla Firefox before 3.6.20, Thunderbird 2.x and 3.x before 3.1.12, ...

github
больше 3 лет назад

Mozilla Firefox before 3.6.20, Thunderbird 2.x and 3.x before 3.1.12, SeaMonkey 1.x and 2.x, and possibly other products does not properly handle the RegExp.input property, which allows remote attackers to bypass the Same Origin Policy and read data from a different domain via a crafted web site, possibly related to a use-after-free.

oracle-oval
около 14 лет назад

ELSA-2011-1164: firefox security update (CRITICAL)

EPSS

Процентиль: 74%
0.00849
Низкий

6.8 Medium

CVSS2