Lucene search

K

Mozilla Firefox and SeaMonkey Plugin Parameters - Remote Buffer Overflow

🗓️ 20 Jul 2010 00:00:00Reported by J23Type 
exploitdb
 exploitdb
🔗 www.exploit-db.com👁 20 Views

Mozilla Firefox and SeaMonkey Plugin Parameters - Remote Buffer Overflow vulnerabilit

Show more
Related
Code
source: https://www.securityfocus.com/bid/41842/info

Mozilla Firefox and SeaMonkey are prone to a buffer-overflow vulnerability.

An attacker can exploit this issue by tricking an unsuspecting victim into viewing a page containing malicious content. A successful exploit will result in the execution of arbitrary attacker-supplied code in the context of the user running the affected application.

This issue is fixed in:

Firefox 3.6.7
Firefox 3.5.11
SeaMonkey 2.0.6

NOTE: This issue was previously covered in BID 41824 (Mozilla Firefox/Thunderbird/SeaMonkey MFSA 2010-34 Through -47 Multiple Remote Vulnerabilities), but has been assigned its own record to better document it. 

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34358.zip

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
20 Jul 2010 00:00Current
7.4High risk
Vulners AI Score7.4
20
.json
Report