Use-after-free vulnerability in Mozilla Firefox prior to 16.0, Firefox ESR 10.x prior to 10.0.8, Thunderbird prior to 16.0, Thunderbird ESR 10.x prior to 10.0.8, and SeaMonkey prior to 2.13 might allow user-assisted remote malicious users to execute arbitrary code via vectors involving use of mozRequestFullScreen to enter full-screen mode, and use of the history.back method for backwards history navigation.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
mozilla firefox esr |
||
mozilla thunderbird esr |
||
mozilla firefox |
||
mozilla thunderbird |
||
mozilla seamonkey |
||
redhat enterprise linux server 5.0 |
||
redhat enterprise linux workstation 5.0 |
||
canonical ubuntu linux 11.04 |
||
canonical ubuntu linux 11.10 |
||
redhat enterprise linux desktop 6.0 |
||
redhat enterprise linux server 6.0 |
||
redhat enterprise linux workstation 6.0 |
||
redhat enterprise linux desktop 5.0 |
||
canonical ubuntu linux 12.04 |
||
redhat enterprise linux eus 6.3 |
||
canonical ubuntu linux 10.04 |
||
suse linux enterprise desktop 11 |
||
suse linux enterprise server 11 |
||
suse linux enterprise server 10 |
||
suse linux enterprise desktop 10 |
||
suse linux enterprise sdk 10 |