Логотип exploitDog
bind:CVE-2015-2712
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2015-2712

Количество 5

Количество 5

ubuntu логотип

CVE-2015-2712

больше 10 лет назад

The asm.js implementation in Mozilla Firefox before 38.0 does not properly determine heap lengths during identification of cases in which bounds checking may be safely skipped, which allows remote attackers to trigger out-of-bounds write operations and possibly execute arbitrary code, or trigger out-of-bounds read operations and possibly obtain sensitive information from process memory, via crafted JavaScript.

CVSS2: 7.5
EPSS: Низкий
redhat логотип

CVE-2015-2712

больше 10 лет назад

The asm.js implementation in Mozilla Firefox before 38.0 does not properly determine heap lengths during identification of cases in which bounds checking may be safely skipped, which allows remote attackers to trigger out-of-bounds write operations and possibly execute arbitrary code, or trigger out-of-bounds read operations and possibly obtain sensitive information from process memory, via crafted JavaScript.

CVSS2: 6.8
EPSS: Низкий
nvd логотип

CVE-2015-2712

больше 10 лет назад

The asm.js implementation in Mozilla Firefox before 38.0 does not properly determine heap lengths during identification of cases in which bounds checking may be safely skipped, which allows remote attackers to trigger out-of-bounds write operations and possibly execute arbitrary code, or trigger out-of-bounds read operations and possibly obtain sensitive information from process memory, via crafted JavaScript.

CVSS2: 7.5
EPSS: Низкий
debian логотип

CVE-2015-2712

больше 10 лет назад

The asm.js implementation in Mozilla Firefox before 38.0 does not prop ...

CVSS2: 7.5
EPSS: Низкий
github логотип

GHSA-qv27-5fh8-jvfp

больше 3 лет назад

The asm.js implementation in Mozilla Firefox before 38.0 does not properly determine heap lengths during identification of cases in which bounds checking may be safely skipped, which allows remote attackers to trigger out-of-bounds write operations and possibly execute arbitrary code, or trigger out-of-bounds read operations and possibly obtain sensitive information from process memory, via crafted JavaScript.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2015-2712

The asm.js implementation in Mozilla Firefox before 38.0 does not properly determine heap lengths during identification of cases in which bounds checking may be safely skipped, which allows remote attackers to trigger out-of-bounds write operations and possibly execute arbitrary code, or trigger out-of-bounds read operations and possibly obtain sensitive information from process memory, via crafted JavaScript.

CVSS2: 7.5
4%
Низкий
больше 10 лет назад
redhat логотип
CVE-2015-2712

The asm.js implementation in Mozilla Firefox before 38.0 does not properly determine heap lengths during identification of cases in which bounds checking may be safely skipped, which allows remote attackers to trigger out-of-bounds write operations and possibly execute arbitrary code, or trigger out-of-bounds read operations and possibly obtain sensitive information from process memory, via crafted JavaScript.

CVSS2: 6.8
4%
Низкий
больше 10 лет назад
nvd логотип
CVE-2015-2712

The asm.js implementation in Mozilla Firefox before 38.0 does not properly determine heap lengths during identification of cases in which bounds checking may be safely skipped, which allows remote attackers to trigger out-of-bounds write operations and possibly execute arbitrary code, or trigger out-of-bounds read operations and possibly obtain sensitive information from process memory, via crafted JavaScript.

CVSS2: 7.5
4%
Низкий
больше 10 лет назад
debian логотип
CVE-2015-2712

The asm.js implementation in Mozilla Firefox before 38.0 does not prop ...

CVSS2: 7.5
4%
Низкий
больше 10 лет назад
github логотип
GHSA-qv27-5fh8-jvfp

The asm.js implementation in Mozilla Firefox before 38.0 does not properly determine heap lengths during identification of cases in which bounds checking may be safely skipped, which allows remote attackers to trigger out-of-bounds write operations and possibly execute arbitrary code, or trigger out-of-bounds read operations and possibly obtain sensitive information from process memory, via crafted JavaScript.

4%
Низкий
больше 3 лет назад

Уязвимостей на страницу