Логотип exploitDog
bind:CVE-2019-9794
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-9794

Количество 12

Количество 12

ubuntu логотип

CVE-2019-9794

почти 7 лет назад

A vulnerability was discovered where specific command line arguments are not properly discarded during Firefox invocation as a shell handler for URLs. This could be used to retrieve and execute files whose location is supplied through these command line arguments if Firefox is configured as the default URI handler for a given URI scheme in third party applications and these applications insufficiently sanitize URL data. *Note: This issue only affects Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.

CVSS3: 9.8
EPSS: Низкий
redhat логотип

CVE-2019-9794

почти 7 лет назад

A vulnerability was discovered where specific command line arguments are not properly discarded during Firefox invocation as a shell handler for URLs. This could be used to retrieve and execute files whose location is supplied through these command line arguments if Firefox is configured as the default URI handler for a given URI scheme in third party applications and these applications insufficiently sanitize URL data. *Note: This issue only affects Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.

CVSS3: 9.8
EPSS: Низкий
nvd логотип

CVE-2019-9794

почти 7 лет назад

A vulnerability was discovered where specific command line arguments are not properly discarded during Firefox invocation as a shell handler for URLs. This could be used to retrieve and execute files whose location is supplied through these command line arguments if Firefox is configured as the default URI handler for a given URI scheme in third party applications and these applications insufficiently sanitize URL data. *Note: This issue only affects Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.

CVSS3: 9.8
EPSS: Низкий
debian логотип

CVE-2019-9794

почти 7 лет назад

A vulnerability was discovered where specific command line arguments a ...

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-2cx8-vq8f-mwm5

больше 3 лет назад

A vulnerability was discovered where specific command line arguments are not properly discarded during Firefox invocation as a shell handler for URLs. This could be used to retrieve and execute files whose location is supplied through these command line arguments if Firefox is configured as the default URI handler for a given URI scheme in third party applications and these applications insufficiently sanitize URL data. *Note: This issue only affects Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.

CVSS3: 9.8
EPSS: Низкий
fstec логотип

BDU:2020-00727

почти 7 лет назад

Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность

CVSS3: 9.8
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:1077-1

почти 7 лет назад

Security update for MozillaFirefox

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:1056-1

почти 7 лет назад

Security update for MozillaFirefox

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:0871-1

почти 7 лет назад

Security update for MozillaFirefox

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:0852-1

почти 7 лет назад

Security update for MozillaFirefox

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:1162-1

почти 7 лет назад

Security update for MozillaThunderbird

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:0853-1

почти 7 лет назад

Security update for MozillaThunderbird

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2019-9794

A vulnerability was discovered where specific command line arguments are not properly discarded during Firefox invocation as a shell handler for URLs. This could be used to retrieve and execute files whose location is supplied through these command line arguments if Firefox is configured as the default URI handler for a given URI scheme in third party applications and these applications insufficiently sanitize URL data. *Note: This issue only affects Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.

CVSS3: 9.8
0%
Низкий
почти 7 лет назад
redhat логотип
CVE-2019-9794

A vulnerability was discovered where specific command line arguments are not properly discarded during Firefox invocation as a shell handler for URLs. This could be used to retrieve and execute files whose location is supplied through these command line arguments if Firefox is configured as the default URI handler for a given URI scheme in third party applications and these applications insufficiently sanitize URL data. *Note: This issue only affects Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.

CVSS3: 9.8
0%
Низкий
почти 7 лет назад
nvd логотип
CVE-2019-9794

A vulnerability was discovered where specific command line arguments are not properly discarded during Firefox invocation as a shell handler for URLs. This could be used to retrieve and execute files whose location is supplied through these command line arguments if Firefox is configured as the default URI handler for a given URI scheme in third party applications and these applications insufficiently sanitize URL data. *Note: This issue only affects Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.

CVSS3: 9.8
0%
Низкий
почти 7 лет назад
debian логотип
CVE-2019-9794

A vulnerability was discovered where specific command line arguments a ...

CVSS3: 9.8
0%
Низкий
почти 7 лет назад
github логотип
GHSA-2cx8-vq8f-mwm5

A vulnerability was discovered where specific command line arguments are not properly discarded during Firefox invocation as a shell handler for URLs. This could be used to retrieve and execute files whose location is supplied through these command line arguments if Firefox is configured as the default URI handler for a given URI scheme in third party applications and these applications insufficiently sanitize URL data. *Note: This issue only affects Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.

CVSS3: 9.8
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2020-00727

Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность

CVSS3: 9.8
0%
Низкий
почти 7 лет назад
suse-cvrf логотип
openSUSE-SU-2019:1077-1

Security update for MozillaFirefox

почти 7 лет назад
suse-cvrf логотип
openSUSE-SU-2019:1056-1

Security update for MozillaFirefox

почти 7 лет назад
suse-cvrf логотип
SUSE-SU-2019:0871-1

Security update for MozillaFirefox

почти 7 лет назад
suse-cvrf логотип
SUSE-SU-2019:0852-1

Security update for MozillaFirefox

почти 7 лет назад
suse-cvrf логотип
openSUSE-SU-2019:1162-1

Security update for MozillaThunderbird

почти 7 лет назад
suse-cvrf логотип
SUSE-SU-2019:0853-1

Security update for MozillaThunderbird

почти 7 лет назад

Уязвимостей на страницу