CVE-2012-3993

Scores

EPSS

0.808high80.8%
0%20%40%60%80%100%

Percentile: 80.8%

CVSS

6.8medium2.0
0246810

CVSS Score: 6.8/10

All CVSS Scores

CVSS 2.0
6.8

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Description

The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 does not properly interact with failures of InstallTrigger methods, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site, related to an “XrayWrapper pollution” issue.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvdredhatubuntu

CWEs

CWE-269

Exploits

Exploit ID: 30474

Source: exploitdb

URL: https://www.exploit-db.com/exploits/30474

Vulnerable Software (21)

Type: Configuration

Product: firefox

Operating System: ubuntu hardy 8.04

Trait:
{  "unfixed": true}

Source: ubuntu

Type: Configuration

Product: firefox

Operating System: rhel 5

Trait:
{  "fixed": "10.0.8-1.el5_8"}

Source: redhat

Type: Configuration

Product: firefox

Operating System: rhel 6

Trait:
{  "fixed": "10.0.8-1.el6_3"}

Source: redhat

Type: Configuration

Product: iceape

Operating System: debian

Trait:
{  "fixed": "2.7.9-1"}

Source: debian

Type: Configuration

Product: iceape

Operating System: debian squeeze 6

Trait:
{  "unaffected": true}

Source: debian

Type: Configuration

Product: icedove

Operating System: debian

Trait:
{  "fixed": "10.0.9-1"}

Source: debian

Type: Configuration

Product: icedove

Operating System: debian squeeze 6

Trait:
{  "unaffected": true}

Source: debian

Type: Configuration

Product: iceweasel

Operating System: debian

Trait:
{  "fixed": "10.0.8esr-1"}

Source: debian

Type: Configuration

Product: iceweasel

Operating System: debian squeeze 6

Trait:
{  "unaffected": true}

Source: debian

Type: Configuration

Product: seamonkey

Operating System: ubuntu hardy 8.04

Trait:
{  "unfixed": true}

Source: ubuntu

Type: Configuration

Product: thunderbird

Operating System: ubuntu hardy 8.04

Trait:
{  "unfixed": true}

Source: ubuntu

Type: Configuration

Product: thunderbird

Operating System: rhel 5

Trait:
{  "fixed": "10.0.8-1.el5_8"}

Source: redhat

Type: Configuration

Product: thunderbird

Operating System: rhel 6

Trait:
{  "fixed": "10.0.8-1.el6_3"}

Source: redhat

Type: Configuration

Product: xulrunner

Operating System: rhel 5

Trait:
{  "fixed": "10.0.8-1.el5_8"}

Source: redhat

Type: Configuration

Product: xulrunner

Operating System: rhel 6

Trait:
{  "fixed": "10.0.8-1.el6_3"}

Source: redhat

Type: Configuration

Product: xulrunner-1.9.2

Operating System: ubuntu hardy 8.04

Trait:
{  "unfixed": true}

Source: ubuntu

Type: Configuration

Vendor: *

Product: firefox

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*",   ...

Source: nvd

Type: Configuration

Vendor: *

Product: firefox

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",      "versionEndIncluding": "15.0.1",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:mozill...

Source: nvd

Type: Configuration

Vendor: *

Product: seamonkey

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:mozilla:seamonkey:*:beta6:*:*:*:*:*:*",      "versionEndIncluding": "2.13",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:mo...

Source: nvd

Type: Configuration

Vendor: *

Product: thunderbird

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",      "versionEndIncluding": "15.0.1",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:mo...

Source: nvd