|Description||Mozilla Firefox before 126.96.36.199, Thunderbird 188.8.131.52 and earlier, and SeaMonkey before 1.1.10 allow remote attackers to execute arbitrary code via an XUL document that includes a script from a chrome: URI that points to a fastload file, related to this file's "privilege level."|
|Source||CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)|
|References||DSA-1607-1, DSA-1615-1, DSA-1621-1, DSA-1697-1|
The information below is based on the following data on fixed versions.