Логотип exploitDog
bind:"CVE-2012-0442" OR bind:"CVE-2012-0449" OR bind:"CVE-2011-3659" OR bind:"CVE-2011-3670"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2012-0442" OR bind:"CVE-2012-0449" OR bind:"CVE-2011-3659" OR bind:"CVE-2011-3670"

Количество 22

Количество 22

github логотип

GHSA-6j4m-9ghg-x3p4

почти 4 года назад

Use-after-free vulnerability in Mozilla Firefox before 3.6.26 and 4.x through 9.0, Thunderbird before 3.1.18 and 5.0 through 9.0, and SeaMonkey before 2.7 might allow remote attackers to execute arbitrary code via vectors related to incorrect AttributeChildRemoved notifications that affect access to removed nsDOMAttribute child nodes.

EPSS: Высокий
github логотип

GHSA-4x38-mjhp-qwrf

почти 4 года назад

Mozilla Firefox before 3.6.26 and 4.x through 6.0, Thunderbird before 3.1.18 and 5.0 through 6.0, and SeaMonkey before 2.4 do not properly enforce the IPv6 literal address syntax, which allows remote attackers to obtain sensitive information by making XMLHttpRequest calls through a proxy and reading the error messages.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-6j4m-9ghg-x3p4

Use-after-free vulnerability in Mozilla Firefox before 3.6.26 and 4.x through 9.0, Thunderbird before 3.1.18 and 5.0 through 9.0, and SeaMonkey before 2.7 might allow remote attackers to execute arbitrary code via vectors related to incorrect AttributeChildRemoved notifications that affect access to removed nsDOMAttribute child nodes.

73%
Высокий
почти 4 года назад
github логотип
GHSA-4x38-mjhp-qwrf

Mozilla Firefox before 3.6.26 and 4.x through 6.0, Thunderbird before 3.1.18 and 5.0 through 6.0, and SeaMonkey before 2.4 do not properly enforce the IPv6 literal address syntax, which allows remote attackers to obtain sensitive information by making XMLHttpRequest calls through a proxy and reading the error messages.

1%
Низкий
почти 4 года назад

Уязвимостей на страницу