Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2008-5913

Опубликовано: 20 янв. 2009
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 4.9

Описание

The Math.random function in the JavaScript implementation in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, uses a random number generator that is seeded only once per browser session, which makes it easier for remote attackers to track a user, or trick a user into acting upon a spoofed pop-up message, by calculating the seed value, related to a "temporary footprint" and an "in-session phishing attack."

РелизСтатусПримечание
dapper

ignored

end of life
devel

released

3.6.7+build2+nobinonly-0ubuntu1
hardy

ignored

end of life
intrepid

DNE

jaunty

DNE

karmic

DNE

lucid

released

3.6.6+nobinonly-0ubuntu0.10.04.1
upstream

released

3.6.4

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

DNE

hardy

ignored

end of life
intrepid

ignored

end of life, was needed
jaunty

ignored

end of life
karmic

DNE

lucid

DNE

upstream

needed

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

DNE

hardy

DNE

intrepid

DNE

jaunty

ignored

end of life
karmic

ignored

end of life
lucid

DNE

upstream

needed

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

released

1.9.2.7+build2+nobinonly-0ubuntu1
hardy

released

1.9.2.6+nobinonly-0ubuntu0.8.04.1
intrepid

DNE

jaunty

released

1.9.2.7+build2+nobinonly-0ubuntu0.9.04.2
karmic

released

1.9.2.7+build2+nobinonly-0ubuntu0.9.10.2
lucid

released

1.9.2.6+nobinonly-0ubuntu0.10.04.1
upstream

needed

Показывать по

EPSS

Процентиль: 56%
0.00345
Низкий

4.9 Medium

CVSS2

Связанные уязвимости

redhat
больше 16 лет назад

The Math.random function in the JavaScript implementation in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, uses a random number generator that is seeded only once per browser session, which makes it easier for remote attackers to track a user, or trick a user into acting upon a spoofed pop-up message, by calculating the seed value, related to a "temporary footprint" and an "in-session phishing attack."

nvd
больше 16 лет назад

The Math.random function in the JavaScript implementation in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, uses a random number generator that is seeded only once per browser session, which makes it easier for remote attackers to track a user, or trick a user into acting upon a spoofed pop-up message, by calculating the seed value, related to a "temporary footprint" and an "in-session phishing attack."

debian
больше 16 лет назад

The Math.random function in the JavaScript implementation in Mozilla F ...

github
около 3 лет назад

The Math.random function in the JavaScript implementation in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, uses a random number generator that is seeded only once per browser session, which makes it easier for remote attackers to track a user, or trick a user into acting upon a spoofed pop-up message, by calculating the seed value, related to a "temporary footprint" and an "in-session phishing attack."

oracle-oval
почти 15 лет назад

ELSA-2010-0501: firefox security, bug fix, and enhancement update (CRITICAL)

EPSS

Процентиль: 56%
0.00345
Низкий

4.9 Medium

CVSS2