Heap-based buffer overflow in Mozilla Network Security Services (NSS) before 3.19.2.3 and 3.20.x and 3.21.x before 3.21.1, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to execute arbitrary code via crafted ASN.1 data in an X.509 certificate.
Metrics
Affected Vendors & Products
References
History
Tue, 22 Oct 2024 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:mozilla:firefox_esr:38.0.5:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:38.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:38.1.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:38.1.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:38.2.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:38.2.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:38.3.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:38.4.0:*:*:*:*:*:*:* |
cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:* |
Vendors & Products |
Mozilla firefox Esr
|
Mon, 21 Oct 2024 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:mozilla:firefox_esr:38.5.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:38.6.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:38.6.1:*:*:*:*:*:*:* |
cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:* |
MITRE
Status: PUBLISHED
Assigner: mozilla
Published: 2016-03-13T18:00:00
Updated: 2024-08-05T23:10:40.259Z
Reserved: 2016-01-20T00:00:00
Link: CVE-2016-1950
Vulnrichment
No data.
NVD
Status : Modified
Published: 2016-03-13T18:59:00.193
Modified: 2024-11-21T02:47:24.970
Link: CVE-2016-1950
Redhat