Логотип exploitDog
bind:CVE-2009-3987
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2009-3987

Количество 5

Количество 5

ubuntu логотип

CVE-2009-3987

почти 16 лет назад

The GeckoActiveXObject function in Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, generates different exception messages depending on whether the referenced COM object is listed in the registry, which allows remote attackers to obtain potentially sensitive information about installed software by making multiple calls that specify the ProgID values of different COM objects.

CVSS2: 7.8
EPSS: Низкий
redhat логотип

CVE-2009-3987

почти 16 лет назад

The GeckoActiveXObject function in Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, generates different exception messages depending on whether the referenced COM object is listed in the registry, which allows remote attackers to obtain potentially sensitive information about installed software by making multiple calls that specify the ProgID values of different COM objects.

EPSS: Низкий
nvd логотип

CVE-2009-3987

почти 16 лет назад

The GeckoActiveXObject function in Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, generates different exception messages depending on whether the referenced COM object is listed in the registry, which allows remote attackers to obtain potentially sensitive information about installed software by making multiple calls that specify the ProgID values of different COM objects.

CVSS2: 7.8
EPSS: Низкий
debian логотип

CVE-2009-3987

почти 16 лет назад

The GeckoActiveXObject function in Mozilla Firefox before 3.0.16 and 3 ...

CVSS2: 7.8
EPSS: Низкий
github логотип

GHSA-vwqf-r5hr-488h

больше 3 лет назад

The GeckoActiveXObject function in Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, generates different exception messages depending on whether the referenced COM object is listed in the registry, which allows remote attackers to obtain potentially sensitive information about installed software by making multiple calls that specify the ProgID values of different COM objects.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2009-3987

The GeckoActiveXObject function in Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, generates different exception messages depending on whether the referenced COM object is listed in the registry, which allows remote attackers to obtain potentially sensitive information about installed software by making multiple calls that specify the ProgID values of different COM objects.

CVSS2: 7.8
1%
Низкий
почти 16 лет назад
redhat логотип
CVE-2009-3987

The GeckoActiveXObject function in Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, generates different exception messages depending on whether the referenced COM object is listed in the registry, which allows remote attackers to obtain potentially sensitive information about installed software by making multiple calls that specify the ProgID values of different COM objects.

1%
Низкий
почти 16 лет назад
nvd логотип
CVE-2009-3987

The GeckoActiveXObject function in Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, generates different exception messages depending on whether the referenced COM object is listed in the registry, which allows remote attackers to obtain potentially sensitive information about installed software by making multiple calls that specify the ProgID values of different COM objects.

CVSS2: 7.8
1%
Низкий
почти 16 лет назад
debian логотип
CVE-2009-3987

The GeckoActiveXObject function in Mozilla Firefox before 3.0.16 and 3 ...

CVSS2: 7.8
1%
Низкий
почти 16 лет назад
github логотип
GHSA-vwqf-r5hr-488h

The GeckoActiveXObject function in Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, generates different exception messages depending on whether the referenced COM object is listed in the registry, which allows remote attackers to obtain potentially sensitive information about installed software by making multiple calls that specify the ProgID values of different COM objects.

1%
Низкий
больше 3 лет назад

Уязвимостей на страницу