Vulnerability Details : CVE-2011-3651
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 7.0 and Thunderbird 7.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
Vulnerability category: Memory CorruptionExecute codeDenial of service
Products affected by CVE-2011-3651
- cpe:2.3:a:mozilla:firefox:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird:7.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2011-3651
63.75%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 98 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2011-3651
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
References for CVE-2011-3651
-
http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00020.html
[security-announce] SUSE-SU-2011:1256-1: critical: Security update for M
-
https://bugzilla.mozilla.org/show_bug.cgi?id=686044
686044 - Crash with after path.pathSegList.appendItem and GC
-
https://bugzilla.mozilla.org/show_bug.cgi?id=646968
646968 - let-block variable initializers are statically outside the let-scope but dynamically inside it
-
http://www.mozilla.org/security/announce/2011/mfsa2011-48.html
Miscellaneous memory safety hazards (rv:8.0) — Mozilla
-
https://bugzilla.mozilla.org/show_bug.cgi?id=671160
671160 - ASSERTION: Uh, inner window set as event target!
-
https://bugzilla.mozilla.org/show_bug.cgi?id=665070
665070 - WebGL functions allocating buffers/textures must check that the GL call succeeded, to prevent allowing context to make out-of-bounds accesses
-
https://bugzilla.mozilla.org/show_bug.cgi?id=675515
675515 - Crash [@ TextUpdater::DoUpdate] with long text node
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14364
Repository / Oval Repository
-
https://bugzilla.mozilla.org/show_bug.cgi?id=677847
677847 - Crash [@ nsContentUtils::IsEventAttributeName ] at address 0x55555555 with malloc scribble
-
https://bugzilla.mozilla.org/show_bug.cgi?id=676918
676918 - [ANGLE] crash from CanvasLayerD3D9::UpdateSurface [@ gl::Context::readPixels(int, int, int, int, unsigned int, unsigned int, void*) ]
-
https://bugzilla.mozilla.org/show_bug.cgi?id=652054
652054 - Crash running jellyfish demo on 64-bit
-
https://bugzilla.mozilla.org/show_bug.cgi?id=679593
679593 - Possible JSScript double-free
-
https://bugzilla.mozilla.org/show_bug.cgi?id=672892
672892 - Crash [@ JSParseNode::append] or "Assertion failure: !pn->pn_defn,"
Jump to