CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS
Percentile
95.7%
Versions of Firefox earlier than 3.6.9 are potentially affected by multiple vulnerabilities :
Multiple memory safety issues that could lead to arbitrary code execution. (MFSA 2010-49)
The implementation of the HTML frameset element contains an integer overflow vulnerability. (MFSA 2010-50)
A dangling pointer vulnerability exists in the implementation of ‘navigator.plugins’ in which the ‘navigator’ object could retain a pointer to the plugins array even after it has been destroyed. (MFSA 2010-51)
Firefox can be used to load a malicious code library that has been planted on a victim’s computer. (MFSA 2010-52)
‘Math.random() PRNG’ values and states could be disclosed across domains making it possible to reconstruct the values and states. (CVE-2010-3171)
A heap buffer overflow exists in code routines responsible for transforming text runs. (MFSA 2010-53)
A dangling pointer issue remains leftover from the fix for CVE-2010-2753. (MFSA 2010-54)
XUL ‘<tree>’ objects can be manipulated such that the setting of certain properties on the object would trigger the removal of the tree from the DOM and cause certain sections of deleted memory to be accessed. (MFSA 2010-55)
The implementation of the XUL ‘<tree>’ content view contains a dangling pointer vulnerability. (MFSA 2010-56)
The code used to normalize a document contains a logical flaw that could be leveraged to run arbitrary code. (MFSA 2010-57)
A specially crafted font can be applied to a document and cause a crash on Mac systems. (MFSA 2010-58)
The wrapper class ‘XPCSafeJSObjectWrapper’ (SJOW) creates scope chains ending in outer objects. (MFSA 2010-59)
The ‘type’ attribute of an <object> tag can override the charset of a framed HTML document even when the document is included across origins. (MFSA 2010-61)
When an HTML selection containing JavaScript is copy-and-pasted or dropped onto a document with designMode enabled, the JavaScript will be executed within the context of the site where the code was dropped. (MFSA 2010-62)
The ‘statusText’ property of an ‘XMLHttpRequest’ object is readable by the requestor even when the request is made across origins. (MFSA 2010-63)
Binary data 800747.prm
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2760
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2762
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2763
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2764
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2765
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2766
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2767
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2768
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2769
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2770
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3131
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3166
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3167
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3168
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3169
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3171
www.mozilla.org/security/announce/2010/mfsa2010-49.html
www.mozilla.org/security/announce/2010/mfsa2010-50.html
www.mozilla.org/security/announce/2010/mfsa2010-51.html
www.mozilla.org/security/announce/2010/mfsa2010-52.html
www.mozilla.org/security/announce/2010/mfsa2010-53.html
www.mozilla.org/security/announce/2010/mfsa2010-54.html
www.mozilla.org/security/announce/2010/mfsa2010-55.html
www.mozilla.org/security/announce/2010/mfsa2010-56.html
www.mozilla.org/security/announce/2010/mfsa2010-57.html
www.mozilla.org/security/announce/2010/mfsa2010-59.html
www.mozilla.org/security/announce/2010/mfsa2010-60.html
www.mozilla.org/security/announce/2010/mfsa2010-61.html
www.mozilla.org/security/announce/2010/mfsa2010-62.html
www.mozilla.org/security/announce/2010/mfsa2010-63.html
www.mozilla.org/security/known-vulnerabilities/firefox36.html#firefox3.6.9
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS
Percentile
95.7%