Lucene search

K
cve[email protected]CVE-2013-1719
HistorySep 18, 2013 - 10:08 a.m.

CVE-2013-1719

2013-09-1810:08:24
CWE-119
web.nvd.nist.gov
52
cve-2013-1719
mozilla firefox
thunderbird
seamonkey
remote attackers
denial of service
arbitrary code
memory corruption
application crash
nvd

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

9.8 High

AI Score

Confidence

High

0.075 Low

EPSS

Percentile

94.1%

Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 24.0, Thunderbird before 24.0, and SeaMonkey before 2.21 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.

Affected configurations

NVD
Node
mozillathunderbirdRange17.0.9
OR
mozillathunderbirdMatch17.0
OR
mozillathunderbirdMatch17.0.1
OR
mozillathunderbirdMatch17.0.2
OR
mozillathunderbirdMatch17.0.3
OR
mozillathunderbirdMatch17.0.4
OR
mozillathunderbirdMatch17.0.5
OR
mozillathunderbirdMatch17.0.6
OR
mozillathunderbirdMatch17.0.7
OR
mozillathunderbirdMatch17.0.8
Node
mozillaseamonkeyRange2.20
OR
mozillaseamonkeyMatch2.0
OR
mozillaseamonkeyMatch2.0alpha_1
OR
mozillaseamonkeyMatch2.0alpha_2
OR
mozillaseamonkeyMatch2.0alpha_3
OR
mozillaseamonkeyMatch2.0beta_1
OR
mozillaseamonkeyMatch2.0beta_2
OR
mozillaseamonkeyMatch2.0rc1
OR
mozillaseamonkeyMatch2.0rc2
OR
mozillaseamonkeyMatch2.0.1
OR
mozillaseamonkeyMatch2.0.2
OR
mozillaseamonkeyMatch2.0.3
OR
mozillaseamonkeyMatch2.0.4
OR
mozillaseamonkeyMatch2.0.5
OR
mozillaseamonkeyMatch2.0.6
OR
mozillaseamonkeyMatch2.0.7
OR
mozillaseamonkeyMatch2.0.8
OR
mozillaseamonkeyMatch2.0.9
OR
mozillaseamonkeyMatch2.0.10
OR
mozillaseamonkeyMatch2.0.11
OR
mozillaseamonkeyMatch2.0.12
OR
mozillaseamonkeyMatch2.0.13
OR
mozillaseamonkeyMatch2.0.14
OR
mozillaseamonkeyMatch2.1
OR
mozillaseamonkeyMatch2.1alpha1
OR
mozillaseamonkeyMatch2.1alpha2
OR
mozillaseamonkeyMatch2.1alpha3
OR
mozillaseamonkeyMatch2.1beta1
OR
mozillaseamonkeyMatch2.1beta2
OR
mozillaseamonkeyMatch2.1beta3
OR
mozillaseamonkeyMatch2.1rc1
OR
mozillaseamonkeyMatch2.1rc2
OR
mozillaseamonkeyMatch2.10
OR
mozillaseamonkeyMatch2.10beta1
OR
mozillaseamonkeyMatch2.10beta2
OR
mozillaseamonkeyMatch2.10beta3
OR
mozillaseamonkeyMatch2.10.1
OR
mozillaseamonkeyMatch2.11
OR
mozillaseamonkeyMatch2.11beta1
OR
mozillaseamonkeyMatch2.11beta2
OR
mozillaseamonkeyMatch2.11beta3
OR
mozillaseamonkeyMatch2.11beta4
OR
mozillaseamonkeyMatch2.11beta5
OR
mozillaseamonkeyMatch2.11beta6
OR
mozillaseamonkeyMatch2.12
OR
mozillaseamonkeyMatch2.12beta1
OR
mozillaseamonkeyMatch2.12beta2
OR
mozillaseamonkeyMatch2.12beta3
OR
mozillaseamonkeyMatch2.12beta4
OR
mozillaseamonkeyMatch2.12beta5
OR
mozillaseamonkeyMatch2.12beta6
OR
mozillaseamonkeyMatch2.12.1
OR
mozillaseamonkeyMatch2.13
OR
mozillaseamonkeyMatch2.13beta1
OR
mozillaseamonkeyMatch2.13beta2
OR
mozillaseamonkeyMatch2.13beta3
OR
mozillaseamonkeyMatch2.13beta4
OR
mozillaseamonkeyMatch2.13beta5
OR
mozillaseamonkeyMatch2.13beta6
OR
mozillaseamonkeyMatch2.13.1
OR
mozillaseamonkeyMatch2.13.2
OR
mozillaseamonkeyMatch2.14
OR
mozillaseamonkeyMatch2.14beta1
OR
mozillaseamonkeyMatch2.14beta2
OR
mozillaseamonkeyMatch2.14beta3
OR
mozillaseamonkeyMatch2.14beta4
OR
mozillaseamonkeyMatch2.14beta5
OR
mozillaseamonkeyMatch2.15
OR
mozillaseamonkeyMatch2.15beta1
OR
mozillaseamonkeyMatch2.15beta2
OR
mozillaseamonkeyMatch2.15beta3
OR
mozillaseamonkeyMatch2.15beta4
OR
mozillaseamonkeyMatch2.15beta5
OR
mozillaseamonkeyMatch2.15beta6
OR
mozillaseamonkeyMatch2.15.1
OR
mozillaseamonkeyMatch2.15.2
OR
mozillaseamonkeyMatch2.16
OR
mozillaseamonkeyMatch2.16beta1
OR
mozillaseamonkeyMatch2.16beta2
OR
mozillaseamonkeyMatch2.16beta3
OR
mozillaseamonkeyMatch2.16beta4
OR
mozillaseamonkeyMatch2.16beta5
OR
mozillaseamonkeyMatch2.16.1
OR
mozillaseamonkeyMatch2.16.2
OR
mozillaseamonkeyMatch2.17
OR
mozillaseamonkeyMatch2.17beta1
OR
mozillaseamonkeyMatch2.17beta2
OR
mozillaseamonkeyMatch2.17beta3
OR
mozillaseamonkeyMatch2.17beta4
OR
mozillaseamonkeyMatch2.17.1
OR
mozillaseamonkeyMatch2.18beta1
OR
mozillaseamonkeyMatch2.18beta2
OR
mozillaseamonkeyMatch2.18beta3
OR
mozillaseamonkeyMatch2.18beta4
OR
mozillaseamonkeyMatch2.19
OR
mozillaseamonkeyMatch2.19beta1
OR
mozillaseamonkeyMatch2.19beta2
OR
mozillaseamonkeyMatch2.20beta1
OR
mozillaseamonkeyMatch2.20beta2
OR
mozillaseamonkeyMatch2.20beta3
Node
mozillafirefoxRange23.0.1
OR
mozillafirefoxMatch19.0
OR
mozillafirefoxMatch19.0.1
OR
mozillafirefoxMatch19.0.2
OR
mozillafirefoxMatch20.0
OR
mozillafirefoxMatch20.0.1
OR
mozillafirefoxMatch21.0
OR
mozillafirefoxMatch22.0
OR
mozillafirefoxMatch23.0

References

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

9.8 High

AI Score

Confidence

High

0.075 Low

EPSS

Percentile

94.1%