CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
AI Score
Confidence
Low
EPSS
Percentile
94.0%
Mozilla Netscape Portable Runtime (NSPR) before 4.10.6 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write) via vectors involving the sprintf and console functions.
Vendor | Product | Version | CPE |
---|---|---|---|
mozilla | netscape_portable_runtime | * | cpe:2.3:a:mozilla:netscape_portable_runtime:*:*:*:*:*:*:*:* |
mozilla | netscape_portable_runtime | 4.1.1 | cpe:2.3:a:mozilla:netscape_portable_runtime:4.1.1:*:*:*:*:*:*:* |
mozilla | netscape_portable_runtime | 4.1.2 | cpe:2.3:a:mozilla:netscape_portable_runtime:4.1.2:*:*:*:*:*:*:* |
mozilla | netscape_portable_runtime | 4.2 | cpe:2.3:a:mozilla:netscape_portable_runtime:4.2:*:*:*:*:*:*:* |
mozilla | netscape_portable_runtime | 4.2.2 | cpe:2.3:a:mozilla:netscape_portable_runtime:4.2.2:*:*:*:*:*:*:* |
mozilla | netscape_portable_runtime | 4.3 | cpe:2.3:a:mozilla:netscape_portable_runtime:4.3:*:*:*:*:*:*:* |
mozilla | netscape_portable_runtime | 4.4.1 | cpe:2.3:a:mozilla:netscape_portable_runtime:4.4.1:*:*:*:*:*:*:* |
mozilla | netscape_portable_runtime | 4.5.1 | cpe:2.3:a:mozilla:netscape_portable_runtime:4.5.1:*:*:*:*:*:*:* |
mozilla | netscape_portable_runtime | 4.6 | cpe:2.3:a:mozilla:netscape_portable_runtime:4.6:*:*:*:*:*:*:* |
mozilla | netscape_portable_runtime | 4.6.1 | cpe:2.3:a:mozilla:netscape_portable_runtime:4.6.1:*:*:*:*:*:*:* |
kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html
lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html
lists.opensuse.org/opensuse-updates/2014-06/msg00040.html
lists.opensuse.org/opensuse-updates/2014-07/msg00001.html
lists.opensuse.org/opensuse-updates/2014-07/msg00004.html
secunia.com/advisories/58984
secunia.com/advisories/59229
secunia.com/advisories/59275
secunia.com/advisories/59318
secunia.com/advisories/59377
secunia.com/advisories/59387
secunia.com/advisories/59425
secunia.com/advisories/59486
secunia.com/advisories/59614
www.debian.org/security/2014/dsa-2955
www.debian.org/security/2014/dsa-2960
www.debian.org/security/2014/dsa-2962
www.mozilla.org/security/announce/2014/mfsa2014-55.html
www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
www.securityfocus.com/bid/67975
www.securitytracker.com/id/1030404
www.ubuntu.com/usn/USN-2265-1
bugzilla.mozilla.org/show_bug.cgi?id=1018783
bugzilla.redhat.com/show_bug.cgi?id=1107432
security.gentoo.org/glsa/201504-01