Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2014-1510

Опубликовано: 19 мар. 2014
Источник: ubuntu
Приоритет: medium
EPSS Высокий
CVSS2: 7.5
CVSS3: 9.8

Описание

The Web IDL implementation in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to execute arbitrary JavaScript code with chrome privileges by using an IDL fragment to trigger a window.open call.

РелизСтатусПримечание
devel

released

28.0+build2-0ubuntu1
lucid

ignored

end of life
precise

released

28.0+build2-0ubuntu0.12.04.1
quantal

released

28.0+build2-0ubuntu0.12.10.1
saucy

released

28.0+build2-0ubuntu0.13.10.1
upstream

released

28.0

Показывать по

РелизСтатусПримечание
devel

released

1:24.4.0+build1-0ubuntu1
lucid

ignored

end of life
precise

released

1:24.4.0+build1-0ubuntu0.12.04.1
quantal

released

1:24.4.0+build1-0ubuntu0.12.10.1
saucy

released

1:24.4.0+build1-0ubuntu0.13.10.2
upstream

released

24.4.0

Показывать по

EPSS

Процентиль: 99%
0.75716
Высокий

7.5 High

CVSS2

9.8 Critical

CVSS3

Связанные уязвимости

redhat
больше 11 лет назад

The Web IDL implementation in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to execute arbitrary JavaScript code with chrome privileges by using an IDL fragment to trigger a window.open call.

CVSS3: 9.8
nvd
больше 11 лет назад

The Web IDL implementation in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to execute arbitrary JavaScript code with chrome privileges by using an IDL fragment to trigger a window.open call.

CVSS3: 9.8
debian
больше 11 лет назад

The Web IDL implementation in Mozilla Firefox before 28.0, Firefox ESR ...

CVSS3: 9.8
github
около 3 лет назад

The Web IDL implementation in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to execute arbitrary JavaScript code with chrome privileges by using an IDL fragment to trigger a window.open call.

fstec
больше 11 лет назад

Уязвимость пакета программ Mozilla SeaMonkey, позволяющая злоумышленнику выполнить произвольный код

EPSS

Процентиль: 99%
0.75716
Высокий

7.5 High

CVSS2

9.8 Critical

CVSS3