The System Only Wrapper (SOW) implementation in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 does not prevent certain cloning operations, which allows remote attackers to bypass intended restrictions on XUL content via vectors involving XBL content scopes.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
History
14 Feb 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | () https://8pecxstudios.com/?page_id=44080 - Broken Link, URL Repurposed |
Information
Published : 2014-02-06 05:44
Updated : 2024-02-14 01:17
NVD link : CVE-2014-1479
Mitre link : CVE-2014-1479
CVE.ORG link : CVE-2014-1479
JSON object : View
Products Affected
debian
- debian_linux
redhat
- enterprise_linux_server_aus
- enterprise_linux_server_eus
- enterprise_linux_server_tus
- enterprise_linux_server
- enterprise_linux_workstation
- enterprise_linux_desktop
- enterprise_linux_eus
fedoraproject
- fedora
opensuse
- opensuse
suse
- suse_linux_enterprise_software_development_kit
- suse_linux_enterprise_server
- suse_linux_enterprise_desktop
mozilla
- seamonkey
- firefox_esr
- thunderbird
- firefox
canonical
- ubuntu_linux
CWE