Files
CVEs-PoC/2012/CVE-2012-1967.md
T
2024-06-18 02:51:15 +02:00

19 lines
838 B
Markdown

### [CVE-2012-1967](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1967)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 do not properly implement the JavaScript sandbox utility, which allows remote attackers to execute arbitrary JavaScript code with improper privileges via a javascript: URL.
### POC
#### Reference
- http://rhn.redhat.com/errata/RHSA-2012-1088.html
- http://www.ubuntu.com/usn/USN-1509-1
#### Github
No PoCs found on GitHub currently.