Количество 5
Количество 5
CVE-2017-7836
The "pingsender" executable used by the Firefox Health Report dynamically loads a system copy of libcurl, which an attacker could replace. This allows for privilege escalation as the replaced libcurl code will run with Firefox's privileges. Note: This attack requires an attacker have local system access and only affects OS X and Linux. Windows systems are not affected. This vulnerability affects Firefox < 57.
CVE-2017-7836
The "pingsender" executable used by the Firefox Health Report dynamically loads a system copy of libcurl, which an attacker could replace. This allows for privilege escalation as the replaced libcurl code will run with Firefox's privileges. Note: This attack requires an attacker have local system access and only affects OS X and Linux. Windows systems are not affected. This vulnerability affects Firefox < 57.
CVE-2017-7836
The "pingsender" executable used by the Firefox Health Report dynamica ...
GHSA-c8qj-chqj-f8j2
The "pingsender" executable used by the Firefox Health Report dynamically loads a system copy of libcurl, which an attacker could replace. This allows for privilege escalation as the replaced libcurl code will run with Firefox's privileges. Note: This attack requires an attacker have local system access and only affects OS X and Linux. Windows systems are not affected. This vulnerability affects Firefox < 57.
BDU:2021-00211
Уязвимость реализации процесса Pingsender браузера Mozilla Firefox, позволяющая нарушителю повысить свои привилегии
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2017-7836 The "pingsender" executable used by the Firefox Health Report dynamically loads a system copy of libcurl, which an attacker could replace. This allows for privilege escalation as the replaced libcurl code will run with Firefox's privileges. Note: This attack requires an attacker have local system access and only affects OS X and Linux. Windows systems are not affected. This vulnerability affects Firefox < 57. | CVSS3: 7.8 | 0% Низкий | больше 7 лет назад | |
CVE-2017-7836 The "pingsender" executable used by the Firefox Health Report dynamically loads a system copy of libcurl, which an attacker could replace. This allows for privilege escalation as the replaced libcurl code will run with Firefox's privileges. Note: This attack requires an attacker have local system access and only affects OS X and Linux. Windows systems are not affected. This vulnerability affects Firefox < 57. | CVSS3: 7.8 | 0% Низкий | больше 7 лет назад | |
CVE-2017-7836 The "pingsender" executable used by the Firefox Health Report dynamica ... | CVSS3: 7.8 | 0% Низкий | больше 7 лет назад | |
GHSA-c8qj-chqj-f8j2 The "pingsender" executable used by the Firefox Health Report dynamically loads a system copy of libcurl, which an attacker could replace. This allows for privilege escalation as the replaced libcurl code will run with Firefox's privileges. Note: This attack requires an attacker have local system access and only affects OS X and Linux. Windows systems are not affected. This vulnerability affects Firefox < 57. | CVSS3: 7.8 | 0% Низкий | больше 3 лет назад | |
BDU:2021-00211 Уязвимость реализации процесса Pingsender браузера Mozilla Firefox, позволяющая нарушителю повысить свои привилегии | CVSS3: 7.8 | 0% Низкий | больше 8 лет назад |
Уязвимостей на страницу