The txXPathNodeUtils::getXSLTId function in txMozillaXPathTreeWalker.cpp and txStandaloneXPathTreeWalker.cpp in Mozilla Firefox before 3.5.19, 3.6.x before 3.6.17, and 4.x before 4.0.1, and SeaMonkey before 2.0.14, allows remote attackers to obtain potentially sensitive information about heap memory addresses via an XML document containing a call to the XSLT generate-id XPath function.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
No history.
Information
Published : 2011-04-15 20:55
Updated : 2017-09-19 01:32
NVD link : CVE-2011-1712
Mitre link : CVE-2011-1712
CVE.ORG link : CVE-2011-1712
JSON object : View
Products Affected
mozilla
- seamonkey
- firefox
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor