Arbitrary code execution vulnerability in the Style Inspector in Mozilla Firefox (Mac OS)ID: oval:org.secpod.oval:def:8052 | Date: (C)2012-11-30 (M)2023-11-19 |
Class: VULNERABILITY | Family: macos |
The host is installed with Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11 and is prone to arbitrary code execution vulnerability. A flaw is present in the applications, which fail to properly restrict the context of HTML markup and Cascading Style Sheets (CSS) token sequences. Successful exploitation allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted stylesheet.
Platform: |
Apple Mac OS 14 |
Apple Mac OS 13 |
Apple Mac OS 12 |
Apple Mac OS 11 |
Apple Mac OS X 10.15 |
Apple Mac OS X 10.14 |
Apple Mac OS X 10.13 |
Apple Mac OS X 10.11 |
Apple Mac OS X 10.12 |
Product: |
Mozilla Firefox |
Mozilla Thunderbird |
Mozilla SeaMonkey |