CVE-2012-0960
Published Nov 24, 2012
Last updated 7 years ago
Overview
- Description
- Unity integration extension (unity-firefox-extension) before 2.4.1 for Firefox does not properly handle callbacks, which allows remote attackers to cause a denial of service (Firefox crash) and possibly execute arbitrary code via a crafted request.
- Source
- security@ubuntu.com
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-20
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:ps_project_management_team:unity-firefox-extension:*:-:*:*:*:firefox:*:*", "vulnerable": true, "matchCriteriaId": "194758C1-17BF-4397-835C-FD8E262F213E", "versionEndIncluding": "2.4.0" }, { "criteria": "cpe:2.3:a:ps_project_management_team:unity-firefox-extension:0.02:-:*:*:*:firefox:*:*", "vulnerable": true, "matchCriteriaId": "0E112F77-A28E-4F77-99DB-8FB948F61FE3" }, { "criteria": "cpe:2.3:a:ps_project_management_team:unity-firefox-extension:0.2.1:-:*:*:*:firefox:*:*", "vulnerable": true, "matchCriteriaId": "425990A7-D102-41BA-B87E-B18F45C7BF8B" }, { "criteria": "cpe:2.3:a:ps_project_management_team:unity-firefox-extension:0.3:-:*:*:*:firefox:*:*", "vulnerable": true, "matchCriteriaId": "B7AE1D5C-9655-4D38-85DA-83AE574C1AD0" }, { "criteria": "cpe:2.3:a:ps_project_management_team:unity-firefox-extension:0.3.1:-:*:*:*:firefox:*:*", "vulnerable": true, "matchCriteriaId": "F8DAFDDF-52C8-470C-8AC0-846BB8E80400" }, { "criteria": "cpe:2.3:a:ps_project_management_team:unity-firefox-extension:2.1:-:*:*:*:firefox:*:*", "vulnerable": true, "matchCriteriaId": "CB247C23-0AEB-45C0-87C7-F6B94D9F1AC7" }, { "criteria": "cpe:2.3:a:ps_project_management_team:unity-firefox-extension:2.2:-:*:*:*:firefox:*:*", "vulnerable": true, "matchCriteriaId": "BDA13BE0-93D3-4679-B0F1-7333F37446AA" }, { "criteria": "cpe:2.3:a:ps_project_management_team:unity-firefox-extension:2.3:-:*:*:*:firefox:*:*", "vulnerable": true, "matchCriteriaId": "96B2EA1F-95EA-4470-B7C8-E9EDB6B8875E" }, { "criteria": "cpe:2.3:a:ps_project_management_team:unity-firefox-extension:2.3.1:-:*:*:*:firefox:*:*", "vulnerable": true, "matchCriteriaId": "A357E273-EBE6-4022-ADA3-9B8C361E9B83" }, { "criteria": "cpe:2.3:a:ps_project_management_team:unity-firefox-extension:2.3.2:-:*:*:*:firefox:*:*", "vulnerable": true, "matchCriteriaId": "DC92F807-1601-4C4E-B2F8-98D155F108D3" }, { "criteria": "cpe:2.3:a:ps_project_management_team:unity-firefox-extension:2.3.3:-:*:*:*:firefox:*:*", "vulnerable": true, "matchCriteriaId": "2B5240A0-985E-4B37-8B73-654E05F08DC7" }, { "criteria": "cpe:2.3:a:ps_project_management_team:unity-firefox-extension:2.3.4:-:*:*:*:firefox:*:*", "vulnerable": true, "matchCriteriaId": "D14ECC6E-6A21-4170-995B-A221038B8D0C" }, { "criteria": "cpe:2.3:a:ps_project_management_team:unity-firefox-extension:2.3.5:-:*:*:*:firefox:*:*", "vulnerable": true, "matchCriteriaId": "EB907444-6F01-4424-904A-4A15A2514C72" } ], "operator": "OR" } ] } ]