7.6 High
AI Score
Confidence
Low
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.015 Low
EPSS
Percentile
86.4%
The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 does not properly interact with failures of InstallTrigger methods, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site, related to an “XrayWrapper pollution” issue.
lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html
osvdb.org/86111
rhn.redhat.com/errata/RHSA-2012-1351.html
secunia.com/advisories/50856
secunia.com/advisories/50892
secunia.com/advisories/50904
secunia.com/advisories/50935
secunia.com/advisories/50936
secunia.com/advisories/50984
secunia.com/advisories/55318
www.mandriva.com/security/advisories?name=MDVSA-2012:163
www.mozilla.org/security/announce/2012/mfsa2012-83.html
www.securityfocus.com/bid/56119
www.ubuntu.com/usn/USN-1611-1
bugzilla.mozilla.org/show_bug.cgi?id=768101
exchange.xforce.ibmcloud.com/vulnerabilities/79153
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16718