Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 allow remote attackers to bypass intended restrictions on window objects by leveraging inconsistency in native getter methods across different JavaScript engines.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
History
14 Feb 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | () https://8pecxstudios.com/?page_id=44080 - Broken Link, URL Repurposed |
Information
Published : 2014-02-06 05:44
Updated : 2024-02-14 01:17
NVD link : CVE-2014-1481
Mitre link : CVE-2014-1481
CVE.ORG link : CVE-2014-1481
JSON object : View
Products Affected
mozilla
- thunderbird
- firefox
- seamonkey
- firefox_esr
redhat
- enterprise_linux_desktop
- enterprise_linux_server_eus
- enterprise_linux_server
- enterprise_linux_server_aus
- enterprise_linux_eus
- enterprise_linux_server_tus
- enterprise_linux_workstation
opensuse
- opensuse
suse
- suse_linux_enterprise_desktop
- suse_linux_enterprise_server
- suse_linux_enterprise_software_development_kit
debian
- debian_linux
canonical
- ubuntu_linux
fedoraproject
- fedora
CWE