Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2013-1728

Опубликовано: 18 сент. 2013
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 4.3

Описание

The IonMonkey JavaScript engine in Mozilla Firefox before 24.0, Thunderbird before 24.0, and SeaMonkey before 2.21, when Valgrind mode is used, does not properly initialize memory, which makes it easier for remote attackers to obtain sensitive information via unspecified vectors.

РелизСтатусПримечание
devel

released

24.0+build1-0ubuntu1
lucid

ignored

end of life
precise

released

24.0+build1-0ubuntu0.12.04.1
quantal

released

24.0+build1-0ubuntu0.12.10.1
raring

released

24.0+build1-0ubuntu0.13.04.1
upstream

released

24.0

Показывать по

РелизСтатусПримечание
devel

released

1:24.0+build1-0ubuntu1
lucid

ignored

end of life
precise

released

1:24.0+build1-0ubuntu0.12.04.1
quantal

released

1:24.0+build1-0ubuntu0.12.10.1
raring

released

1:24.0+build1-0ubuntu0.13.04.1
upstream

released

24.0

Показывать по

EPSS

Процентиль: 73%
0.00769
Низкий

4.3 Medium

CVSS2

Связанные уязвимости

redhat
больше 12 лет назад

The IonMonkey JavaScript engine in Mozilla Firefox before 24.0, Thunderbird before 24.0, and SeaMonkey before 2.21, when Valgrind mode is used, does not properly initialize memory, which makes it easier for remote attackers to obtain sensitive information via unspecified vectors.

nvd
больше 12 лет назад

The IonMonkey JavaScript engine in Mozilla Firefox before 24.0, Thunderbird before 24.0, and SeaMonkey before 2.21, when Valgrind mode is used, does not properly initialize memory, which makes it easier for remote attackers to obtain sensitive information via unspecified vectors.

debian
больше 12 лет назад

The IonMonkey JavaScript engine in Mozilla Firefox before 24.0, Thunde ...

github
больше 3 лет назад

The IonMonkey JavaScript engine in Mozilla Firefox before 24.0, Thunderbird before 24.0, and SeaMonkey before 2.21, when Valgrind mode is used, does not properly initialize memory, which makes it easier for remote attackers to obtain sensitive information via unspecified vectors.

EPSS

Процентиль: 73%
0.00769
Низкий

4.3 Medium

CVSS2