Логотип exploitDog
bind:"CVE-2012-0442" OR bind:"CVE-2012-0449" OR bind:"CVE-2011-3659" OR bind:"CVE-2011-3670"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2012-0442" OR bind:"CVE-2012-0449" OR bind:"CVE-2011-3659" OR bind:"CVE-2011-3670"

Количество 22

Количество 22

github логотип

GHSA-6j4m-9ghg-x3p4

больше 3 лет назад

Use-after-free vulnerability in Mozilla Firefox before 3.6.26 and 4.x through 9.0, Thunderbird before 3.1.18 and 5.0 through 9.0, and SeaMonkey before 2.7 might allow remote attackers to execute arbitrary code via vectors related to incorrect AttributeChildRemoved notifications that affect access to removed nsDOMAttribute child nodes.

EPSS: Высокий
github логотип

GHSA-4x38-mjhp-qwrf

больше 3 лет назад

Mozilla Firefox before 3.6.26 and 4.x through 6.0, Thunderbird before 3.1.18 and 5.0 through 6.0, and SeaMonkey before 2.4 do not properly enforce the IPv6 literal address syntax, which allows remote attackers to obtain sensitive information by making XMLHttpRequest calls through a proxy and reading the error messages.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-6j4m-9ghg-x3p4

Use-after-free vulnerability in Mozilla Firefox before 3.6.26 and 4.x through 9.0, Thunderbird before 3.1.18 and 5.0 through 9.0, and SeaMonkey before 2.7 might allow remote attackers to execute arbitrary code via vectors related to incorrect AttributeChildRemoved notifications that affect access to removed nsDOMAttribute child nodes.

76%
Высокий
больше 3 лет назад
github логотип
GHSA-4x38-mjhp-qwrf

Mozilla Firefox before 3.6.26 and 4.x through 6.0, Thunderbird before 3.1.18 and 5.0 through 6.0, and SeaMonkey before 2.4 do not properly enforce the IPv6 literal address syntax, which allows remote attackers to obtain sensitive information by making XMLHttpRequest calls through a proxy and reading the error messages.

1%
Низкий
больше 3 лет назад

Уязвимостей на страницу