Search for vulnerabilities
Vulnerability ID | VCID-xqvf-aww2-6be8 |
Aliases |
CVE-2014-1479
|
Summary | Security researcher Cody Crews reported a method to bypass System Only Wrappers (SOW) by using XML Binding Language (XBL) content scopes to clone protected XUL elements. This could be used to clone anonymous nodes, making trusted XUL content web accessible. In general this flaw cannot be exploited through email in the Thunderbird and Seamonkey products because scripting is disabled in mail, but is potentially a risk in browser or browser-like contexts. |
Status | Published |
Exploitability | 0.5 |
Weighted Severity | 8.0 |
Risk | 4.0 |
Affected and Fixed Packages | Package Details |
There are no known CWE. |
Reference id | Reference type | URL |
---|---|---|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1479.json | ||
https://api.first.org/data/v1/epss?cve=CVE-2014-1479 | ||
1060940 | https://bugzilla.redhat.com/show_bug.cgi?id=1060940 | |
CVE-2014-1479 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479 | |
mfsa2014-02 | https://www.mozilla.org/en-US/security/advisories/mfsa2014-02 | |
RHSA-2014:0132 | https://access.redhat.com/errata/RHSA-2014:0132 | |
RHSA-2014:0133 | https://access.redhat.com/errata/RHSA-2014:0133 | |
USN-2102-1 | https://usn.ubuntu.com/2102-1/ | |
USN-2119-1 | https://usn.ubuntu.com/2119-1/ |
Percentile | 0.80098 |
EPSS Score | 0.01468 |
Published At | July 30, 2025, 12:55 p.m. |
Date | Actor | Action | Source | VulnerableCode Version |
---|---|---|---|---|
2025-07-31T08:10:43.667716+00:00 | Mozilla Importer | Import | https://github.com/mozilla/foundation-security-advisories/blob/master/announce/2014/mfsa2014-02.md | 37.0.0 |