Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2014-1479

Опубликовано: 06 фев. 2014
Источник: ubuntu
Приоритет: medium
CVSS2: 5
CVSS3: 7.5

Описание

The System Only Wrapper (SOW) implementation in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 does not prevent certain cloning operations, which allows remote attackers to bypass intended restrictions on XUL content via vectors involving XBL content scopes.

РелизСтатусПримечание
devel

not-affected

lucid

ignored

end of life
precise

released

27.0+build1-0ubuntu0.12.04.1
quantal

released

27.0+build1-0ubuntu0.12.10.1
saucy

released

27.0+build1-0ubuntu0.13.10.1
upstream

released

27.0

Показывать по

РелизСтатусПримечание
devel

released

1:24.4.0+build1-0ubuntu1
lucid

ignored

end of life
precise

released

1:24.3.0+build2-0ubuntu0.12.04.1
quantal

released

1:24.3.0+build2-0ubuntu0.12.10.1
saucy

released

1:24.3.0+build2-0ubuntu0.13.10.1
upstream

released

24.3.0

Показывать по

5 Medium

CVSS2

7.5 High

CVSS3

Связанные уязвимости

redhat
больше 11 лет назад

The System Only Wrapper (SOW) implementation in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 does not prevent certain cloning operations, which allows remote attackers to bypass intended restrictions on XUL content via vectors involving XBL content scopes.

CVSS3: 7.5
nvd
больше 11 лет назад

The System Only Wrapper (SOW) implementation in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 does not prevent certain cloning operations, which allows remote attackers to bypass intended restrictions on XUL content via vectors involving XBL content scopes.

CVSS3: 7.5
debian
больше 11 лет назад

The System Only Wrapper (SOW) implementation in Mozilla Firefox before ...

CVSS3: 7.5
github
около 3 лет назад

The System Only Wrapper (SOW) implementation in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 does not prevent certain cloning operations, which allows remote attackers to bypass intended restrictions on XUL content via vectors involving XBL content scopes.

fstec
больше 11 лет назад

Уязвимость пакета программ Mozilla SeaMonkey, позволяющая злоумышленнику обойти ограничения

5 Medium

CVSS2

7.5 High

CVSS3