Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-8636

Опубликовано: 15 янв. 2014
Источник: redhat
CVSS2: 4.3
EPSS Высокий

Описание

The XrayWrapper implementation in Mozilla Firefox before 35.0 and SeaMonkey before 2.32 does not properly interact with a DOM object that has a named getter, which might allow remote attackers to execute arbitrary JavaScript code with chrome privileges via unspecified vectors.

Отчет

This issue does not affect the version of firefox and thunderbird as shipped with Red Hat Enterprise Linux 5, 6 and 7.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5firefoxNot affected
Red Hat Enterprise Linux 5thunderbirdNot affected
Red Hat Enterprise Linux 6firefoxNot affected
Red Hat Enterprise Linux 6thunderbirdNot affected
Red Hat Enterprise Linux 7firefoxNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-250
https://bugzilla.redhat.com/show_bug.cgi?id=1180977Mozilla: XrayWrapper bypass through DOM objects (MFSA 2015-09)

EPSS

Процентиль: 99%
0.83612
Высокий

4.3 Medium

CVSS2

Связанные уязвимости

ubuntu
около 11 лет назад

The XrayWrapper implementation in Mozilla Firefox before 35.0 and SeaMonkey before 2.32 does not properly interact with a DOM object that has a named getter, which might allow remote attackers to execute arbitrary JavaScript code with chrome privileges via unspecified vectors.

nvd
около 11 лет назад

The XrayWrapper implementation in Mozilla Firefox before 35.0 and SeaMonkey before 2.32 does not properly interact with a DOM object that has a named getter, which might allow remote attackers to execute arbitrary JavaScript code with chrome privileges via unspecified vectors.

debian
около 11 лет назад

The XrayWrapper implementation in Mozilla Firefox before 35.0 and SeaM ...

github
больше 3 лет назад

The XrayWrapper implementation in Mozilla Firefox before 35.0 and SeaMonkey before 2.32 does not properly interact with a DOM object that has a named getter, which might allow remote attackers to execute arbitrary JavaScript code with chrome privileges via unspecified vectors.

EPSS

Процентиль: 99%
0.83612
Высокий

4.3 Medium

CVSS2