Files
cve/2012/CVE-2012-1967.md

19 lines
849 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2012-1967](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1967)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
2025-09-29 21:09:30 +02:00
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen)
2024-05-26 14:27:05 +02:00
### Description
Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 do not properly implement the JavaScript sandbox utility, which allows remote attackers to execute arbitrary JavaScript code with improper privileges via a javascript: URL.
### POC
#### Reference
- http://rhn.redhat.com/errata/RHSA-2012-1088.html
- http://www.ubuntu.com/usn/USN-1509-1
#### Github
No PoCs found on GitHub currently.