Files
cve/2012/CVE-2012-3972.md

25 lines
1.1 KiB
Markdown
Raw Permalink Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2012-3972](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3972)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
2025-09-29 21:09:30 +02:00
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen)
2024-05-26 14:27:05 +02:00
### Description
The format-number functionality in the XSLT implementation in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to obtain sensitive information via unspecified vectors that trigger a heap-based buffer over-read.
### POC
#### Reference
- https://bugzilla.mozilla.org/show_bug.cgi?id=746855
#### Github
- https://github.com/Hwangtaewon/radamsa
2025-09-29 21:09:30 +02:00
- https://github.com/JulianDavis/radamsa
2024-05-26 14:27:05 +02:00
- https://github.com/StephenHaruna/RADAMSA
2025-09-29 21:09:30 +02:00
- https://github.com/marcostolosa/radamsa
2024-05-26 14:27:05 +02:00
- https://github.com/nqwang/radamsa
- https://github.com/sambacha/mirror-radamsa
- https://github.com/sunzu94/radamsa-Fuzzer
2025-09-29 21:09:30 +02:00
- https://github.com/vnc0/radamsa-ios
2024-05-26 14:27:05 +02:00