Логотип exploitDog
bind:CVE-2014-1507
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2014-1507

Количество 3

Количество 3

ubuntu логотип

CVE-2014-1507

почти 12 лет назад

Directory traversal vulnerability in the DeviceStorage API in Mozilla FirefoxOS before 1.2.2 allows attackers to bypass the media sandbox protection mechanism, and read or modify arbitrary files, via a crafted application that uses a relative pathname for a DeviceStorageFile object.

CVSS2: 9.3
EPSS: Низкий
nvd логотип

CVE-2014-1507

почти 12 лет назад

Directory traversal vulnerability in the DeviceStorage API in Mozilla FirefoxOS before 1.2.2 allows attackers to bypass the media sandbox protection mechanism, and read or modify arbitrary files, via a crafted application that uses a relative pathname for a DeviceStorageFile object.

CVSS2: 9.3
EPSS: Низкий
github логотип

GHSA-r587-wfm5-v67q

больше 3 лет назад

Directory traversal vulnerability in the DeviceStorage API in Mozilla FirefoxOS before 1.2.2 allows attackers to bypass the media sandbox protection mechanism, and read or modify arbitrary files, via a crafted application that uses a relative pathname for a DeviceStorageFile object.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2014-1507

Directory traversal vulnerability in the DeviceStorage API in Mozilla FirefoxOS before 1.2.2 allows attackers to bypass the media sandbox protection mechanism, and read or modify arbitrary files, via a crafted application that uses a relative pathname for a DeviceStorageFile object.

CVSS2: 9.3
1%
Низкий
почти 12 лет назад
nvd логотип
CVE-2014-1507

Directory traversal vulnerability in the DeviceStorage API in Mozilla FirefoxOS before 1.2.2 allows attackers to bypass the media sandbox protection mechanism, and read or modify arbitrary files, via a crafted application that uses a relative pathname for a DeviceStorageFile object.

CVSS2: 9.3
1%
Низкий
почти 12 лет назад
github логотип
GHSA-r587-wfm5-v67q

Directory traversal vulnerability in the DeviceStorage API in Mozilla FirefoxOS before 1.2.2 allows attackers to bypass the media sandbox protection mechanism, and read or modify arbitrary files, via a crafted application that uses a relative pathname for a DeviceStorageFile object.

1%
Низкий
больше 3 лет назад

Уязвимостей на страницу