Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-5595

Опубликовано: 30 окт. 2013
Источник: debian
EPSS Низкий

Описание

The JavaScript engine in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 does not properly allocate memory for unspecified functions, which allows remote attackers to conduct buffer overflow attacks via a crafted web page.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
iceweaselfixed24.1.0esr-1package
iceweaselend-of-lifesqueezepackage
icedoveend-of-lifesqueezepackage
iceapeend-of-lifesqueezepackage
iceapeend-of-lifewheezypackage
icedovefixed17.0.10-1package
iceaperemovedpackage

EPSS

Процентиль: 83%
0.01926
Низкий

Связанные уязвимости

ubuntu
почти 12 лет назад

The JavaScript engine in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 does not properly allocate memory for unspecified functions, which allows remote attackers to conduct buffer overflow attacks via a crafted web page.

redhat
почти 12 лет назад

The JavaScript engine in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 does not properly allocate memory for unspecified functions, which allows remote attackers to conduct buffer overflow attacks via a crafted web page.

nvd
почти 12 лет назад

The JavaScript engine in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 does not properly allocate memory for unspecified functions, which allows remote attackers to conduct buffer overflow attacks via a crafted web page.

github
больше 3 лет назад

The JavaScript engine in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 does not properly allocate memory for unspecified functions, which allows remote attackers to conduct buffer overflow attacks via a crafted web page.

oracle-oval
почти 12 лет назад

ELSA-2013-1480: thunderbird security update (IMPORTANT)

EPSS

Процентиль: 83%
0.01926
Низкий